<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2025-01-29T14:46:34</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20074559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204077">SUSE bug 1204077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764905" comment="libpython3_6m1_0-3.6.15-150300.10.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764906" comment="python3-3.6.15-150300.10.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764907" comment="python3-base-3.6.15-150300.10.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4645</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4645" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4646</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4646" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    (1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036527.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861948" comment="perl-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861949" comment="perl-base-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036527.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224040">SUSE bug 1224040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861948" comment="perl-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861949" comment="perl-base-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14560</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14560" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174246">SUSE bug 1174246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009757403" comment="qemu-ovmf-x86_64-202202-150400.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009757406" comment="qemu-uefi-aarch64-202202-150400.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623392" comment="qemu-uefi-aarch64 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY/#H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803273" comment="libssh2-1-1.11.0-150000.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25162</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25162" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: Fix a potential use after free

Free the adap structure only after we are done using it.
This patch just moves the put_device() down a bit to avoid the
use after free.

[wsa: added comment to the code, added Fixes tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035966.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-07-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861736" comment="libcairo-gobject2-1.16.0-150400.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158152" comment="libcairo-gobject2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861737" comment="libcairo2-1.16.0-150400.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158156" comment="libcairo2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2024:0647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVDVOYJ5IRTMFBUIFQNNT57NKN3MNRN4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175778">SUSE bug 1175778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781385" comment="libicu73_2-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782296" comment="libicu73_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781386" comment="libicu73_2-bedata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782297" comment="libicu73_2-bedata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781389" comment="libicu73_2-ledata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782300" comment="libicu73_2-ledata is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12912" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178760">SUSE bug 1178760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14394" ref_url="https://www.suse.com/security/cve/CVE-2020-14394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
    <description>
    An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14394/">CVE-2020-14394 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14394">CVE-2020-14394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180207">SUSE bug 1180207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744477" comment="qemu-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744319" comment="qemu-accel-tcg-x86-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744320" comment="qemu-arm-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744478" comment="qemu-audio-spice-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744479" comment="qemu-chardev-spice-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744480" comment="qemu-guest-agent-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744481" comment="qemu-hw-display-qxl-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744482" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744483" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744484" comment="qemu-hw-usb-redirect-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744194" comment="qemu-ipxe-1.0.0+-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744332" comment="qemu-s390x-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744203" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744204" comment="qemu-sgabios-8-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744485" comment="qemu-tools-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744486" comment="qemu-ui-opengl-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744487" comment="qemu-ui-spice-core-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744213" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744337" comment="qemu-x86-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18768</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18768" ref_url="https://www.suse.com/security/cve/CVE-2020-18768" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18768/">CVE-2020-18768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18768">CVE-2020-18768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214574">SUSE bug 1214574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21913" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016928.html" source="SUSE-SU"/>
    <description>
    International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781385" comment="libicu73_2-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782296" comment="libicu73_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781386" comment="libicu73_2-bedata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782297" comment="libicu73_2-bedata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781389" comment="libicu73_2-ledata-73.2-150000.1.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009782300" comment="libicu73_2-ledata is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202022218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-22218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-22218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-22218" ref_url="https://www.suse.com/security/cve/CVE-2020-22218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016300.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22218/">CVE-2020-22218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22218">CVE-2020-22218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214527">SUSE bug 1214527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217508">SUSE bug 1217508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218318">SUSE bug 1218318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218349">SUSE bug 1218349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221580">SUSE bug 1221580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009780690" comment="libssh2-1-1.9.0-150000.4.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26555</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: avoid a use-after-free when BO init fails

nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm_bo_init() invokes the provided
destructor which should de-initialize and free the memory.

Thus, when nouveau_bo_init() returns an error the gem object has already
been released and the memory freed by nouveau_bo_del_ttm().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8694</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179661">SUSE bug 1179661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26345</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26345" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33631</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3507">CVE-2021-3507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185000">SUSE bug 1185000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744477" comment="qemu-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744319" comment="qemu-accel-tcg-x86-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744320" comment="qemu-arm-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744478" comment="qemu-audio-spice-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744479" comment="qemu-chardev-spice-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744480" comment="qemu-guest-agent-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744481" comment="qemu-hw-display-qxl-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744482" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744483" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744484" comment="qemu-hw-usb-redirect-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744194" comment="qemu-ipxe-1.0.0+-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744332" comment="qemu-s390x-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744203" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744204" comment="qemu-sgabios-8-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744485" comment="qemu-tools-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744486" comment="qemu-ui-opengl-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744487" comment="qemu-ui-spice-core-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744213" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744337" comment="qemu-x86-6.2.0-150400.37.14.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3521" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1557-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1557-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019071.html" source="SUSE-SU"/>
    <description>
    There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191175">SUSE bug 1191175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859567" comment="python3-rpm-4.14.3-150400.59.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231456" comment="python3-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859568" comment="rpm-4.14.3-150400.59.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859569" comment="rpm-ndb-4.14.3-150400.59.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631126" comment="rpm-ndb is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3638</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3638" ref_url="https://www.suse.com/security/cve/CVE-2021-3638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3638/">CVE-2021-3638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3638">CVE-2021-3638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800600" comment="qemu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800547" comment="qemu-accel-tcg-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800548" comment="qemu-arm-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800601" comment="qemu-audio-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800602" comment="qemu-chardev-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800603" comment="qemu-guest-agent-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800604" comment="qemu-hw-display-qxl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800605" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800606" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800607" comment="qemu-hw-usb-redirect-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800518" comment="qemu-ipxe-1.0.0+-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800560" comment="qemu-s390x-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800526" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800527" comment="qemu-sgabios-8-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800608" comment="qemu-tools-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800609" comment="qemu-ui-opengl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800610" comment="qemu-ui-spice-core-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800535" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800565" comment="qemu-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3750</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3750" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3750" ref_url="https://www.suse.com/security/cve/CVE-2021-3750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3750/">CVE-2021-3750 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3750">CVE-2021-3750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190011">SUSE bug 1190011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190015">SUSE bug 1190015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193880">SUSE bug 1193880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800600" comment="qemu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800547" comment="qemu-accel-tcg-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800548" comment="qemu-arm-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800601" comment="qemu-audio-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800602" comment="qemu-chardev-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800603" comment="qemu-guest-agent-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800604" comment="qemu-hw-display-qxl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800605" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800606" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800607" comment="qemu-hw-usb-redirect-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800518" comment="qemu-ipxe-1.0.0+-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800560" comment="qemu-s390x-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800526" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800527" comment="qemu-sgabios-8-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800608" comment="qemu-tools-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800609" comment="qemu-ui-opengl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800610" comment="qemu-ui-spice-core-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800535" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800565" comment="qemu-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38578</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
    <description>
    Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196741">SUSE bug 1196741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009757403" comment="qemu-ovmf-x86_64-202202-150400.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009757406" comment="qemu-uefi-aarch64-202202-150400.5.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623392" comment="qemu-uefi-aarch64 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-06-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41072</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41072" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41229</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41229" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41229" ref_url="https://www.suse.com/security/cve/CVE-2021-41229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
    <description>
    BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41229/">CVE-2021-41229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41229">CVE-2021-41229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192760">SUSE bug 1192760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777400" comment="libbluetooth3-5.62-150400.4.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4148</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43056</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43527</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
    <description>
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS &lt; 3.73 and NSS &lt; 3.68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193331">SUSE bug 1193331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193378">SUSE bug 1193378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199301">SUSE bug 1199301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225630">SUSE bug 1225630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46766" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46766" ref_url="https://www.suse.com/security/cve/CVE-2021-46766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46766/">CVE-2021-46766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46766">CVE-2021-46766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46774</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46774" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46774" ref_url="https://www.suse.com/security/cve/CVE-2021-46774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46774/">CVE-2021-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46774">CVE-2021-46774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/mount_setattr: always cleanup mount_kattr

Make sure that finish_mount_kattr() is called after mount_kattr was
succesfully built in both the success and failure case to prevent
leaking any references we took when we built it.  We returned early if
path lookup failed thereby risking to leak an additional reference we
took when building mount_kattr when an idmapped mount was requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: st21nfca: Fix memory leak in device probe and remove

'phy-&gt;pending_skb' is alloced when device probe, but forgot to free
in the error handling path and remove path, this cause memory leak
as follows:

unreferenced object 0xffff88800bc06800 (size 512):
  comm "8", pid 11775, jiffies 4295159829 (age 9.032s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000d66c09ce&gt;] __kmalloc_node_track_caller+0x1ed/0x450
    [&lt;00000000c93382b3&gt;] kmalloc_reserve+0x37/0xd0
    [&lt;000000005fea522c&gt;] __alloc_skb+0x124/0x380
    [&lt;0000000019f29f9a&gt;] st21nfca_hci_i2c_probe+0x170/0x8f2

Fix it by freeing 'pending_skb' in error and remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46925" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix kernel panic caused by race of smc_sock

A crash occurs when smc_cdc_tx_handler() tries to access smc_sock
but smc_release() has already freed it.

[ 4570.695099] BUG: unable to handle page fault for address: 000000002eae9e88
[ 4570.696048] #PF: supervisor write access in kernel mode
[ 4570.696728] #PF: error_code(0x0002) - not-present page
[ 4570.697401] PGD 0 P4D 0
[ 4570.697716] Oops: 0002 [#1] PREEMPT SMP NOPTI
[ 4570.698228] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.16.0-rc4+ #111
[ 4570.699013] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8c24b4c 04/0
[ 4570.699933] RIP: 0010:_raw_spin_lock+0x1a/0x30
&lt;...&gt;
[ 4570.711446] Call Trace:
[ 4570.711746]  &lt;IRQ&gt;
[ 4570.711992]  smc_cdc_tx_handler+0x41/0xc0
[ 4570.712470]  smc_wr_tx_tasklet_fn+0x213/0x560
[ 4570.712981]  ? smc_cdc_tx_dismisser+0x10/0x10
[ 4570.713489]  tasklet_action_common.isra.17+0x66/0x140
[ 4570.714083]  __do_softirq+0x123/0x2f4
[ 4570.714521]  irq_exit_rcu+0xc4/0xf0
[ 4570.714934]  common_interrupt+0xba/0xe0

Though smc_cdc_tx_handler() checked the existence of smc connection,
smc_release() may have already dismissed and released the smc socket
before smc_cdc_tx_handler() further visits it.

smc_cdc_tx_handler()           |smc_release()
if (!conn)                     |
                               |
                               |smc_cdc_tx_dismiss_slots()
                               |      smc_cdc_tx_dismisser()
                               |
                               |sock_put(&amp;smc-&gt;sk) &lt;- last sock_put,
                               |                      smc_sock freed
bh_lock_sock(&amp;smc-&gt;sk) (panic) |

To make sure we won't receive any CDC messages after we free the
smc_sock, add a refcount on the smc_connection for inflight CDC
message(posted to the QP but haven't received related CQE), and
don't release the smc_connection until all the inflight CDC messages
haven been done, for both success or failed ones.

Using refcount on CDC messages brings another problem: when the link
is going to be destroyed, smcr_link_clear() will reset the QP, which
then remove all the pending CQEs related to the QP in the CQ. To make
sure all the CQEs will always come back so the refcount on the
smc_connection can always reach 0, smc_ib_modify_qp_reset() was replaced
by smc_ib_modify_qp_error().
And remove the timeout in smc_wr_tx_wait_no_pending_sends() since we
need to wait for all pending WQEs done, or we may encounter use-after-
free when handling CQEs.

For IB device removal routine, we need to wait for all the QPs on that
device been destroyed before we can destroy CQs on the device, or
the refcount on smc_connection won't reach 0 and smc_sock cannot be
released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46926</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46926" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: intel-sdw-acpi: harden detection of controller

The existing code currently sets a pointer to an ACPI handle before
checking that it's actually a SoundWire controller. This can lead to
issues where the graph walk continues and eventually fails, but the
pointer was set already.

This patch changes the logic so that the information provided to
the caller is set when a controller is found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46927</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46927" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert

After commit 5b78ed24e8ec ("mm/pagemap: add mmap_assert_locked()
annotations to find_vma*()"), the call to get_user_pages() will trigger
the mmap assert.

static inline void mmap_assert_locked(struct mm_struct *mm)
{
	lockdep_assert_held(&amp;mm-&gt;mmap_lock);
	VM_BUG_ON_MM(!rwsem_is_locked(&amp;mm-&gt;mmap_lock), mm);
}

[   62.521410] kernel BUG at include/linux/mmap_lock.h:156!
...........................................................
[   62.538938] RIP: 0010:find_vma+0x32/0x80
...........................................................
[   62.605889] Call Trace:
[   62.608502]  &lt;TASK&gt;
[   62.610956]  ? lock_timer_base+0x61/0x80
[   62.614106]  find_extend_vma+0x19/0x80
[   62.617195]  __get_user_pages+0x9b/0x6a0
[   62.620356]  __gup_longterm_locked+0x42d/0x450
[   62.623721]  ? finish_wait+0x41/0x80
[   62.626748]  ? __kmalloc+0x178/0x2f0
[   62.629768]  ne_set_user_memory_region_ioctl.isra.0+0x225/0x6a0 [nitro_enclaves]
[   62.635776]  ne_enclave_ioctl+0x1cf/0x6d7 [nitro_enclaves]
[   62.639541]  __x64_sys_ioctl+0x82/0xb0
[   62.642620]  do_syscall_64+0x3b/0x90
[   62.645642]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Use get_user_pages_unlocked() when setting the enclave memory regions.
That's a similar pattern as mmap_read_lock() used together with
get_user_pages().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: use call_rcu to free endpoint

This patch is to delay the endpoint free by calling call_rcu() to fix
another use-after-free issue in sctp_sock_dump():

  BUG: KASAN: use-after-free in __lock_acquire+0x36d9/0x4c20
  Call Trace:
    __lock_acquire+0x36d9/0x4c20 kernel/locking/lockdep.c:3218
    lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844
    __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
    _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168
    spin_lock_bh include/linux/spinlock.h:334 [inline]
    __lock_sock+0x203/0x350 net/core/sock.c:2253
    lock_sock_nested+0xfe/0x120 net/core/sock.c:2774
    lock_sock include/net/sock.h:1492 [inline]
    sctp_sock_dump+0x122/0xb20 net/sctp/diag.c:324
    sctp_for_each_transport+0x2b5/0x370 net/sctp/socket.c:5091
    sctp_diag_dump+0x3ac/0x660 net/sctp/diag.c:527
    __inet_diag_dump+0xa8/0x140 net/ipv4/inet_diag.c:1049
    inet_diag_dump+0x9b/0x110 net/ipv4/inet_diag.c:1065
    netlink_dump+0x606/0x1080 net/netlink/af_netlink.c:2244
    __netlink_dump_start+0x59a/0x7c0 net/netlink/af_netlink.c:2352
    netlink_dump_start include/linux/netlink.h:216 [inline]
    inet_diag_handler_cmd+0x2ce/0x3f0 net/ipv4/inet_diag.c:1170
    __sock_diag_cmd net/core/sock_diag.c:232 [inline]
    sock_diag_rcv_msg+0x31d/0x410 net/core/sock_diag.c:263
    netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2477
    sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:274

This issue occurs when asoc is peeled off and the old sk is freed after
getting it by asoc-&gt;base.sk and before calling lock_sock(sk).

To prevent the sk free, as a holder of the sk, ep should be alive when
calling lock_sock(). This patch uses call_rcu() and moves sock_put and
ep free into sctp_endpoint_destroy_rcu(), so that it's safe to try to
hold the ep under rcu_read_lock in sctp_transport_traverse_process().

If sctp_endpoint_hold() returns true, it means this ep is still alive
and we have held it and can continue to dump it; If it returns false,
it means this ep is dead and can be freed after rcu_read_unlock, and
we should skip it.

In sctp_sock_dump(), after locking the sk, if this ep is different from
tsp-&gt;asoc-&gt;ep, it means during this dumping, this asoc was peeled off
before calling lock_sock(), and the sk should be skipped; If this ep is
the same with tsp-&gt;asoc-&gt;ep, it means no peeloff happens on this asoc,
and due to lock_sock, no peeloff will happen either until release_sock.

Note that delaying endpoint free won't delay the port release, as the
port release happens in sctp_endpoint_destroy() before calling call_rcu().
Also, freeing endpoint by call_rcu() makes it safe to access the sk by
asoc-&gt;base.sk in sctp_assocs_seq_show() and sctp_rcv().

Thanks Jones to bring this issue up.

v1-&gt;v2:
  - improve the changelog.
  - add kfree(ep) into sctp_endpoint_destroy_rcu(), as Jakub noticed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-06-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222400">SUSE bug 1222400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: mtu3: fix list_head check warning

This is caused by uninitialization of list_head.

BUG: KASAN: use-after-free in __list_del_entry_valid+0x34/0xe4

Call trace:
dump_backtrace+0x0/0x298
show_stack+0x24/0x34
dump_stack+0x130/0x1a8
print_address_description+0x88/0x56c
__kasan_report+0x1b8/0x2a0
kasan_report+0x14/0x20
__asan_load8+0x9c/0xa0
__list_del_entry_valid+0x34/0xe4
mtu3_req_complete+0x4c/0x300 [mtu3]
mtu3_gadget_stop+0x168/0x448 [mtu3]
usb_gadget_unregister_driver+0x204/0x3a0
unregister_gadget_item+0x44/0xa4
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Wrap the tx reporter dump callback to extract the sq

Function mlx5e_tx_reporter_dump_sq() casts its void * argument to struct
mlx5e_txqsq *, but in TX-timeout-recovery flow the argument is actually
of type struct mlx5e_tx_timeout_ctx *.

 mlx5_core 0000:08:00.1 enp8s0f1: TX timeout detected
 mlx5_core 0000:08:00.1 enp8s0f1: TX timeout on queue: 1, SQ: 0x11ec, CQ: 0x146d, SQ Cons: 0x0 SQ Prod: 0x1, usecs since last trans: 21565000
 BUG: stack guard page was hit at 0000000093f1a2de (stack is 00000000b66ea0dc..000000004d932dae)
 kernel stack overflow (page fault): 0000 [#1] SMP NOPTI
 CPU: 5 PID: 95 Comm: kworker/u20:1 Tainted: G W OE 5.13.0_mlnx #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Workqueue: mlx5e mlx5e_tx_timeout_work [mlx5_core]
 RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180
 [mlx5_core]
 Call Trace:
 mlx5e_tx_reporter_dump+0x43/0x1c0 [mlx5_core]
 devlink_health_do_dump.part.91+0x71/0xd0
 devlink_health_report+0x157/0x1b0
 mlx5e_reporter_tx_timeout+0xb9/0xf0 [mlx5_core]
 ? mlx5e_tx_reporter_err_cqe_recover+0x1d0/0x1d0
 [mlx5_core]
 ? mlx5e_health_queue_dump+0xd0/0xd0 [mlx5_core]
 ? update_load_avg+0x19b/0x550
 ? set_next_entity+0x72/0x80
 ? pick_next_task_fair+0x227/0x340
 ? finish_task_switch+0xa2/0x280
   mlx5e_tx_timeout_work+0x83/0xb0 [mlx5_core]
   process_one_work+0x1de/0x3a0
   worker_thread+0x2d/0x3c0
 ? process_one_work+0x3a0/0x3a0
   kthread+0x115/0x130
 ? kthread_park+0x90/0x90
   ret_from_fork+0x1f/0x30
 --[ end trace 51ccabea504edaff ]---
 RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180
 PKRU: 55555554
 Kernel panic - not syncing: Fatal exception
 Kernel Offset: disabled
 end Kernel panic - not syncing: Fatal exception

To fix this bug add a wrapper for mlx5e_tx_reporter_dump_sq() which
extracts the sq from struct mlx5e_tx_timeout_ctx and set it as the
TX-timeout-recovery flow dump callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46932" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: appletouch - initialize work before device registration

Syzbot has reported warning in __flush_work(). This warning is caused by
work-&gt;func == NULL, which means missing work initialization.

This may happen, since input_dev-&gt;close() calls
cancel_work_sync(&amp;dev-&gt;work), but dev-&gt;work initalization happens _after_
input_register_device() call.

So this patch moves dev-&gt;work initialization before registering input
device
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46933</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46933" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.

ffs_data_clear is indirectly called from both ffs_fs_kill_sb and
ffs_ep0_release, so it ends up being called twice when userland closes ep0
and then unmounts f_fs.
If userland provided an eventfd along with function's USB descriptors, it
ends up calling eventfd_ctx_put as many times, causing a refcount
underflow.
NULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.

Also, set epfiles to NULL right after de-allocating it, for readability.

For completeness, ffs_data_clear actually ends up being called thrice, the
last call being before the whole ffs structure gets freed, so when this
specific sequence happens there is a second underflow happening (but not
being reported):

/sys/kernel/debug/tracing# modprobe usb_f_fs
/sys/kernel/debug/tracing# echo ffs_data_clear &gt; set_ftrace_filter
/sys/kernel/debug/tracing# echo function &gt; current_tracer
/sys/kernel/debug/tracing# echo 1 &gt; tracing_on
(setup gadget, run and kill function userland process, teardown gadget)
/sys/kernel/debug/tracing# echo 0 &gt; tracing_on
/sys/kernel/debug/tracing# cat trace
 smartcard-openp-436     [000] .....  1946.208786: ffs_data_clear &lt;-ffs_data_closed
 smartcard-openp-431     [000] .....  1946.279147: ffs_data_clear &lt;-ffs_data_closed
 smartcard-openp-431     [000] .n...  1946.905512: ffs_data_clear &lt;-ffs_data_put

Warning output corresponding to above trace:
[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c
[ 1946.293094] refcount_t: underflow; use-after-free.
[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)
[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G         C OE     5.15.0-1-rpi #1  Debian 5.15.3-1
[ 1946.417950] Hardware name: BCM2835
[ 1946.425442] Backtrace:
[ 1946.432048] [&lt;c08d60a0&gt;] (dump_backtrace) from [&lt;c08d62ec&gt;] (show_stack+0x20/0x24)
[ 1946.448226]  r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c
[ 1946.458412] [&lt;c08d62cc&gt;] (show_stack) from [&lt;c08d9ae0&gt;] (dump_stack+0x28/0x30)
[ 1946.470380] [&lt;c08d9ab8&gt;] (dump_stack) from [&lt;c0123500&gt;] (__warn+0xe8/0x154)
[ 1946.482067]  r5:c04a948c r4:c0a71dc8
[ 1946.490184] [&lt;c0123418&gt;] (__warn) from [&lt;c08d6948&gt;] (warn_slowpath_fmt+0xa0/0xe4)
[ 1946.506758]  r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04
[ 1946.517070] [&lt;c08d68ac&gt;] (warn_slowpath_fmt) from [&lt;c04a948c&gt;] (refcount_warn_saturate+0x110/0x15c)
[ 1946.535309]  r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0
[ 1946.546708] [&lt;c04a937c&gt;] (refcount_warn_saturate) from [&lt;c0380134&gt;] (eventfd_ctx_put+0x48/0x74)
[ 1946.564476] [&lt;c03800ec&gt;] (eventfd_ctx_put) from [&lt;bf5464e8&gt;] (ffs_data_clear+0xd0/0x118 [usb_f_fs])
[ 1946.582664]  r5:c3b84c00 r4:c2695b00
[ 1946.590668] [&lt;bf546418&gt;] (ffs_data_clear [usb_f_fs]) from [&lt;bf547cc0&gt;] (ffs_data_closed+0x9c/0x150 [usb_f_fs])
[ 1946.609608]  r5:bf54d014 r4:c2695b00
[ 1946.617522] [&lt;bf547c24&gt;] (ffs_data_closed [usb_f_fs]) from [&lt;bf547da0&gt;] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])
[ 1946.636217]  r7:c0dfcb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: validate user data in compat ioctl

Wrong user data may cause warning in i2c_transfer(), ex: zero msgs.
Userspace should not be able to trigger warnings, so this patch adds
validation checks for user data in compact ioctl to prevent reported
warnings
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46936</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46936" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix use-after-free in tw_timer_handler

A real world panic issue was found as follow in Linux 5.4.

    BUG: unable to handle page fault for address: ffffde49a863de28
    PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0
    RIP: 0010:tw_timer_handler+0x20/0x40
    Call Trace:
     &lt;IRQ&gt;
     call_timer_fn+0x2b/0x120
     run_timer_softirq+0x1ef/0x450
     __do_softirq+0x10d/0x2b8
     irq_exit+0xc7/0xd0
     smp_apic_timer_interrupt+0x68/0x120
     apic_timer_interrupt+0xf/0x20

This issue was also reported since 2017 in the thread [1],
unfortunately, the issue was still can be reproduced after fixing
DCCP.

The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net
namespace is destroyed since tcp_sk_ops is registered befrore
ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops
in the list of pernet_list. There will be a use-after-free on
net-&gt;mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net
if there are some inflight time-wait timers.

This bug is not introduced by commit f2bf415cfed7 ("mib: add net to
NET_ADD_STATS_BH") since the net_statistics is a global variable
instead of dynamic allocation and freeing. Actually, commit
61a7e26028b9 ("mib: put net statistics on struct net") introduces
the bug since it put net statistics on struct net and free it when
net namespace is destroyed.

Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug
and replace pr_crit() with panic() since continuing is meaningless
when init_ipv4_mibs() fails.

[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47047</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47047" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails

The spi controller supports 44-bit address space on AXI in DMA mode,
so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.
In addition, if dma_map_single fails, it should return immediately
instead of continuing doing the DMA operation which bases on invalid
address.

This fixes the following crash which occurs in reading a big block
from flash:

[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)
[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped
[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0
[  123.792536] Mem abort info:
[  123.795313]   ESR = 0x96000145
[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits
[  123.803655]   SET = 0, FnV = 0
[  123.806693]   EA = 0, S1PTW = 0
[  123.809818] Data abort info:
[  123.812683]   ISV = 0, ISS = 0x00000145
[  123.816503]   CM = 1, WnR = 1
[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000
[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000
[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47082</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47082" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: avoid double free in tun_free_netdev

Avoid double free in tun_free_netdev() by moving the
dev-&gt;tstats and tun-&gt;security allocs to a new ndo_init routine
(tun_net_init()) that will be called by register_netdevice().
ndo_init is paired with the desctructor (tun_free_netdev()),
so if there's an error in register_netdevice() the destructor
will handle the frees.

BUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605

CPU: 0 PID: 25750 Comm: syz-executor416 Not tainted 5.16.0-rc2-syzk #1
Hardware name: Red Hat KVM, BIOS
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:247
kasan_report_invalid_free+0x55/0x80 mm/kasan/report.c:372
____kasan_slab_free mm/kasan/common.c:346 [inline]
__kasan_slab_free+0x107/0x120 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:235 [inline]
slab_free_hook mm/slub.c:1723 [inline]
slab_free_freelist_hook mm/slub.c:1749 [inline]
slab_free mm/slub.c:3513 [inline]
kfree+0xac/0x2d0 mm/slub.c:4561
selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605
security_tun_dev_free_security+0x4f/0x90 security/security.c:2342
tun_free_netdev+0xe6/0x150 drivers/net/tun.c:2215
netdev_run_todo+0x4df/0x840 net/core/dev.c:10627
rtnl_unlock+0x13/0x20 net/core/rtnetlink.c:112
__tun_chr_ioctl+0x80c/0x2870 drivers/net/tun.c:3302
tun_chr_ioctl+0x2f/0x40 drivers/net/tun.c:3311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:874 [inline]
__se_sys_ioctl fs/ioctl.c:860 [inline]
__x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47083</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: mediatek: fix global-out-of-bounds issue

When eint virtual eint number is greater than gpio number,
it maybe produce 'desc[eint_n]' size globle-out-of-bounds issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47087</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47087" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: optee: Fix incorrect page free bug

Pointer to the allocated pages (struct page *page) has already
progressed towards the end of allocation. It is incorrect to perform
__free_pages(page, order) using this pointer as we would free any
arbitrary pages. Fix this by stop modifying the page pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47091</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix locking in ieee80211_start_ap error path

We need to hold the local-&gt;mtx to release the channel context,
as even encoded by the lockdep_assert_held() there. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47093</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47093" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel_pmc_core: fix memleak on registration failure

In case device registration fails during module initialisation, the
platform device structure needs to be freed using platform_device_put()
to properly free all resources (e.g. the device name).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47094</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47094" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Don't advance iterator after restart due to yielding

After dropping mmu_lock in the TDP MMU, restart the iterator during
tdp_iter_next() and do not advance the iterator.  Advancing the iterator
results in skipping the top-level SPTE and all its children, which is
fatal if any of the skipped SPTEs were not visited before yielding.

When zapping all SPTEs, i.e. when min_level == root_level, restarting the
iter and then invoking tdp_iter_next() is always fatal if the current gfn
has as a valid SPTE, as advancing the iterator results in try_step_side()
skipping the current gfn, which wasn't visited before yielding.

Sprinkle WARNs on iter-&gt;yielded being true in various helpers that are
often used in conjunction with yielding, and tag the helper with
__must_check to reduce the probabily of improper usage.

Failing to zap a top-level SPTE manifests in one of two ways.  If a valid
SPTE is skipped by both kvm_tdp_mmu_zap_all() and kvm_tdp_mmu_put_root(),
the shadow page will be leaked and KVM will WARN accordingly.

  WARNING: CPU: 1 PID: 3509 at arch/x86/kvm/mmu/tdp_mmu.c:46 [kvm]
  RIP: 0010:kvm_mmu_uninit_tdp_mmu+0x3e/0x50 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_destroy_vm+0x130/0x1b0 [kvm]
   kvm_destroy_vm+0x162/0x2a0 [kvm]
   kvm_vcpu_release+0x34/0x60 [kvm]
   __fput+0x82/0x240
   task_work_run+0x5c/0x90
   do_exit+0x364/0xa10
   ? futex_unqueue+0x38/0x60
   do_group_exit+0x33/0xa0
   get_signal+0x155/0x850
   arch_do_signal_or_restart+0xed/0x750
   exit_to_user_mode_prepare+0xc5/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x48/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae

If kvm_tdp_mmu_zap_all() skips a gfn/SPTE but that SPTE is then zapped by
kvm_tdp_mmu_put_root(), KVM triggers a use-after-free in the form of
marking a struct page as dirty/accessed after it has been put back on the
free list.  This directly triggers a WARN due to encountering a page with
page_count() == 0, but it can also lead to data corruption and additional
errors in the kernel.

  WARNING: CPU: 7 PID: 1995658 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:171
  RIP: 0010:kvm_is_zone_device_pfn.part.0+0x9e/0xd0 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_set_pfn_dirty+0x120/0x1d0 [kvm]
   __handle_changed_spte+0x92e/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   zap_gfn_range+0x549/0x620 [kvm]
   kvm_tdp_mmu_put_root+0x1b6/0x270 [kvm]
   mmu_free_root_page+0x219/0x2c0 [kvm]
   kvm_mmu_free_roots+0x1b4/0x4e0 [kvm]
   kvm_mmu_unload+0x1c/0xa0 [kvm]
   kvm_arch_destroy_vm+0x1f2/0x5c0 [kvm]
   kvm_put_kvm+0x3b1/0x8b0 [kvm]
   kvm_vcpu_release+0x4e/0x70 [kvm]
   __fput+0x1f7/0x8c0
   task_work_run+0xf8/0x1a0
   do_exit+0x97b/0x2230
   do_group_exit+0xda/0x2a0
   get_signal+0x3be/0x1e50
   arch_do_signal_or_restart+0x244/0x17f0
   exit_to_user_mode_prepare+0xcb/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x4d/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Note, the underlying bug existed even before commit 1af4a96025b3 ("KVM:
x86/mmu: Yield in TDU MMU iter even if no SPTES changed") moved calls to
tdp_mmu_iter_cond_resched() to the beginning of loops, as KVM could still
incorrectly advance past a top-level entry when yielding on a lower-level
entry.  But with respect to leaking shadow pages, the bug was introduced
by yielding before processing the current gfn.

Alternatively, tdp_mmu_iter_cond_resched() could simply fall through, or
callers could jump to their "retry" label.  The downside of that approach
is that tdp_mmu_iter_cond_resched() _must_ be called before anything else
in the loop, and there's no easy way to enfornce that requirement.

Ideally, KVM would handling the cond_resched() fully within the iterator
macro (the code is actually quite clean) and avoid this entire class of
bugs, but that is extremely difficult do wh
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222401">SUSE bug 1222401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47095" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: ssif: initialize ssif_info-&gt;client early

During probe ssif_info-&gt;client is dereferenced in error path. However,
it is set when some of the error checking has already been done. This
causes following kernel crash if an error path is taken:

[   30.645593][  T674] ipmi_ssif 0-000e: ipmi_ssif: Not probing, Interface already present
[   30.657616][  T674] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000088
...
[   30.657723][  T674] pc : __dev_printk+0x28/0xa0
[   30.657732][  T674] lr : _dev_err+0x7c/0xa0
...
[   30.657772][  T674] Call trace:
[   30.657775][  T674]  __dev_printk+0x28/0xa0
[   30.657778][  T674]  _dev_err+0x7c/0xa0
[   30.657781][  T674]  ssif_probe+0x548/0x900 [ipmi_ssif 62ce4b08badc1458fd896206d9ef69a3c31f3d3e]
[   30.657791][  T674]  i2c_device_probe+0x37c/0x3c0
...

Initialize ssif_info-&gt;client before any error path can be taken. Clear
i2c_client data in the error path to prevent the dangling pointer from
leaking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47096</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47096" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: rawmidi - fix the uninitalized user_pversion

The user_pversion was uninitialized for the user space file structure
in the open function, because the file private structure use
kmalloc for the allocation.

The kernel ALSA sequencer code clears the file structure, so no additional
fixes are required.

BugLink: https://github.com/alsa-project/alsa-lib/issues/178
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47097</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47097" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: elantech - fix stack out of bound access in elantech_change_report_id()

The array param[] in elantech_change_report_id() must be at least 3
bytes, because elantech_read_reg_params() is calling ps2_command() with
PSMOUSE_CMD_GETINFO, that is going to access 3 bytes from param[], but
it's defined in the stack as an array of 2 bytes, therefore we have a
potential stack out-of-bounds access here, also confirmed by KASAN:

[    6.512374] BUG: KASAN: stack-out-of-bounds in __ps2_command+0x372/0x7e0
[    6.512397] Read of size 1 at addr ffff8881024d77c2 by task kworker/2:1/118

[    6.512416] CPU: 2 PID: 118 Comm: kworker/2:1 Not tainted 5.13.0-22-generic #22+arighi20211110
[    6.512428] Hardware name: LENOVO 20T8000QGE/20T8000QGE, BIOS R1AET32W (1.08 ) 08/14/2020
[    6.512436] Workqueue: events_long serio_handle_event
[    6.512453] Call Trace:
[    6.512462]  show_stack+0x52/0x58
[    6.512474]  dump_stack+0xa1/0xd3
[    6.512487]  print_address_description.constprop.0+0x1d/0x140
[    6.512502]  ? __ps2_command+0x372/0x7e0
[    6.512516]  __kasan_report.cold+0x7d/0x112
[    6.512527]  ? _raw_write_lock_irq+0x20/0xd0
[    6.512539]  ? __ps2_command+0x372/0x7e0
[    6.512552]  kasan_report+0x3c/0x50
[    6.512564]  __asan_load1+0x6a/0x70
[    6.512575]  __ps2_command+0x372/0x7e0
[    6.512589]  ? ps2_drain+0x240/0x240
[    6.512601]  ? dev_printk_emit+0xa2/0xd3
[    6.512612]  ? dev_vprintk_emit+0xc5/0xc5
[    6.512621]  ? __kasan_check_write+0x14/0x20
[    6.512634]  ? mutex_lock+0x8f/0xe0
[    6.512643]  ? __mutex_lock_slowpath+0x20/0x20
[    6.512655]  ps2_command+0x52/0x90
[    6.512670]  elantech_ps2_command+0x4f/0xc0 [psmouse]
[    6.512734]  elantech_change_report_id+0x1e6/0x256 [psmouse]
[    6.512799]  ? elantech_report_trackpoint.constprop.0.cold+0xd/0xd [psmouse]
[    6.512863]  ? ps2_command+0x7f/0x90
[    6.512877]  elantech_query_info.cold+0x6bd/0x9ed [psmouse]
[    6.512943]  ? elantech_setup_ps2+0x460/0x460 [psmouse]
[    6.513005]  ? psmouse_reset+0x69/0xb0 [psmouse]
[    6.513064]  ? psmouse_attr_set_helper+0x2a0/0x2a0 [psmouse]
[    6.513122]  ? phys_pmd_init+0x30e/0x521
[    6.513137]  elantech_init+0x8a/0x200 [psmouse]
[    6.513200]  ? elantech_init_ps2+0xf0/0xf0 [psmouse]
[    6.513249]  ? elantech_query_info+0x440/0x440 [psmouse]
[    6.513296]  ? synaptics_send_cmd+0x60/0x60 [psmouse]
[    6.513342]  ? elantech_query_info+0x440/0x440 [psmouse]
[    6.513388]  ? psmouse_try_protocol+0x11e/0x170 [psmouse]
[    6.513432]  psmouse_extensions+0x65d/0x6e0 [psmouse]
[    6.513476]  ? psmouse_try_protocol+0x170/0x170 [psmouse]
[    6.513519]  ? mutex_unlock+0x22/0x40
[    6.513526]  ? ps2_command+0x7f/0x90
[    6.513536]  ? psmouse_probe+0xa3/0xf0 [psmouse]
[    6.513580]  psmouse_switch_protocol+0x27d/0x2e0 [psmouse]
[    6.513624]  psmouse_connect+0x272/0x530 [psmouse]
[    6.513669]  serio_driver_probe+0x55/0x70
[    6.513679]  really_probe+0x190/0x720
[    6.513689]  driver_probe_device+0x160/0x1f0
[    6.513697]  device_driver_attach+0x119/0x130
[    6.513705]  ? device_driver_attach+0x130/0x130
[    6.513713]  __driver_attach+0xe7/0x1a0
[    6.513720]  ? device_driver_attach+0x130/0x130
[    6.513728]  bus_for_each_dev+0xfb/0x150
[    6.513738]  ? subsys_dev_iter_exit+0x10/0x10
[    6.513748]  ? _raw_write_unlock_bh+0x30/0x30
[    6.513757]  driver_attach+0x2d/0x40
[    6.513764]  serio_handle_event+0x199/0x3d0
[    6.513775]  process_one_work+0x471/0x740
[    6.513785]  worker_thread+0x2d2/0x790
[    6.513794]  ? process_one_work+0x740/0x740
[    6.513802]  kthread+0x1b4/0x1e0
[    6.513809]  ? set_kthread_struct+0x80/0x80
[    6.513816]  ret_from_fork+0x22/0x30

[    6.513832] The buggy address belongs to the page:
[    6.513838] page:00000000bc35e189 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d7
[    6.513847] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)
[    6.513860] raw: 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47098</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47098" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations

Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of
temperature calculations") addressed a number of underflow situations
when writing temperature limits. However, it missed one situation, seen
when an attempt is made to set the hysteresis value to MAX_LONG and the
critical temperature limit is negative.

Use clamp_val() when setting the hysteresis temperature to ensure that
the provided value can never overflow or underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47099</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47099" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: ensure skb entering GRO are not cloned.

After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"),
if GRO is enabled on a veth device and TSO is disabled on the peer
device, TCP skbs will go through the NAPI callback. If there is no XDP
program attached, the veth code does not perform any share check, and
shared/cloned skbs could enter the GRO engine.

Ignat reported a BUG triggered later-on due to the above condition:

[   53.970529][    C1] kernel BUG at net/core/skbuff.c:3574!
[   53.981755][    C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
[   53.982634][    C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25
[   53.982634][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[   53.982634][    C1] RIP: 0010:skb_shift+0x13ef/0x23b0
[   53.982634][    C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0
7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f
85 74 f5 ff ff &lt;0f&gt; 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89
f7 4c 89 8c
[   53.982634][    C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246
[   53.982634][    C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000
[   53.982634][    C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2
[   53.982634][    C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0
[   53.982634][    C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590
[   53.982634][    C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0
[   53.982634][    C1] FS:  0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000
[   53.982634][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   53.982634][    C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0
[   53.982634][    C1] Call Trace:
[   53.982634][    C1]  &lt;TASK&gt;
[   53.982634][    C1]  tcp_sacktag_walk+0xaba/0x18e0
[   53.982634][    C1]  tcp_sacktag_write_queue+0xe7b/0x3460
[   53.982634][    C1]  tcp_ack+0x2666/0x54b0
[   53.982634][    C1]  tcp_rcv_established+0x4d9/0x20f0
[   53.982634][    C1]  tcp_v4_do_rcv+0x551/0x810
[   53.982634][    C1]  tcp_v4_rcv+0x22ed/0x2ed0
[   53.982634][    C1]  ip_protocol_deliver_rcu+0x96/0xaf0
[   53.982634][    C1]  ip_local_deliver_finish+0x1e0/0x2f0
[   53.982634][    C1]  ip_sublist_rcv_finish+0x211/0x440
[   53.982634][    C1]  ip_list_rcv_finish.constprop.0+0x424/0x660
[   53.982634][    C1]  ip_list_rcv+0x2c8/0x410
[   53.982634][    C1]  __netif_receive_skb_list_core+0x65c/0x910
[   53.982634][    C1]  netif_receive_skb_list_internal+0x5f9/0xcb0
[   53.982634][    C1]  napi_complete_done+0x188/0x6e0
[   53.982634][    C1]  gro_cell_poll+0x10c/0x1d0
[   53.982634][    C1]  __napi_poll+0xa1/0x530
[   53.982634][    C1]  net_rx_action+0x567/0x1270
[   53.982634][    C1]  __do_softirq+0x28a/0x9ba
[   53.982634][    C1]  run_ksoftirqd+0x32/0x60
[   53.982634][    C1]  smpboot_thread_fn+0x559/0x8c0
[   53.982634][    C1]  kthread+0x3b9/0x490
[   53.982634][    C1]  ret_from_fork+0x22/0x30
[   53.982634][    C1]  &lt;/TASK&gt;

Address the issue by skipping the GRO stage for shared or cloned skbs.
To reduce the chance of OoO, try to unclone the skbs before giving up.

v1 -&gt; v2:
 - use avoid skb_copy and fallback to netif_receive_skb  - Eric
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47100</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module

Hi,

When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko,
the system crashed.

The log as follows:
[  141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a
[  141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0
[  141.087464] Oops: 0010 [#1] SMP NOPTI
[  141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47
[  141.088009] Workqueue: events 0xffffffffc09b3a40
[  141.088009] RIP: 0010:0xffffffffc09b3a5a
[  141.088009] Code: Bad RIP value.
[  141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246
[  141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000
[  141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[  141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1
[  141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700
[  141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8
[  141.088009] FS:  0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000
[  141.088009] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0
[  141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  141.088009] PKRU: 55555554
[  141.088009] Call Trace:
[  141.088009]  ? process_one_work+0x195/0x390
[  141.088009]  ? worker_thread+0x30/0x390
[  141.088009]  ? process_one_work+0x390/0x390
[  141.088009]  ? kthread+0x10d/0x130
[  141.088009]  ? kthread_flush_work_fn+0x10/0x10
[  141.088009]  ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a
[  200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0
[  200.223464] Oops: 0010 [#1] SMP NOPTI
[  200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46
[  200.224008] Workqueue: events 0xffffffffc0b28a40
[  200.224008] RIP: 0010:0xffffffffc0b28a5a
[  200.224008] Code: Bad RIP value.
[  200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246
[  200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000
[  200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[  200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5
[  200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700
[  200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8
[  200.224008] FS:  0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000
[  200.224008] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0
[  200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  200.224008] PKRU: 55555554
[  200.224008] Call Trace:
[  200.224008]  ? process_one_work+0x195/0x390
[  200.224008]  ? worker_thread+0x30/0x390
[  200.224008]  ? process_one_work+0x390/0x390
[  200.224008]  ? kthread+0x10d/0x130
[  200.224008]  ? kthread_flush_work_fn+0x10/0x10
[  200.224008]  ? ret_from_fork+0x35/0x40
[  200.224008] kernel fault(0x1) notification starting on CPU 63
[  200.224008] kernel fault(0x1) notification finished on CPU 63
[  200.224008] CR2: ffffffffc0b28a5a
[  200.224008] ---[ end trace c82a412d93f57412 ]---

The reason is as follows:
T1: rmmod ipmi_si.
    -&gt;ipmi_unregister_smi()
        -&gt; ipmi_bmc_unregister()
            -&gt; __ipmi_bmc_unregister()
                -&gt; kref_put(&amp;bmc-&gt;usecount, cleanup_bmc_device);
                    -&gt; schedule_work(&amp;bmc-&gt;remove_work);

T2: rmmod ipmi_msghandl
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47101</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

asix: fix uninit-value in asix_mdio_read()

asix_read_cmd() may read less than sizeof(smsr) bytes and in this case
smsr will be uninitialized.

Fail log:
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
BUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
 asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47102</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47102" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix incorrect structure access

In line:
	upper = info-&gt;upper_dev;
We access upper_dev field, which is related only for particular events
(e.g. event == NETDEV_CHANGEUPPER). So, this line cause invalid memory
access for another events,
when ptr is not netdev_notifier_changeupper_info.

The KASAN logs are as follows:

[   30.123165] BUG: KASAN: stack-out-of-bounds in prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]
[   30.133336] Read of size 8 at addr ffff80000cf772b0 by task udevd/778
[   30.139866]
[   30.141398] CPU: 0 PID: 778 Comm: udevd Not tainted 5.16.0-rc3 #6
[   30.147588] Hardware name: DNI AmazonGo1 A7040 board (DT)
[   30.153056] Call trace:
[   30.155547]  dump_backtrace+0x0/0x2c0
[   30.159320]  show_stack+0x18/0x30
[   30.162729]  dump_stack_lvl+0x68/0x84
[   30.166491]  print_address_description.constprop.0+0x74/0x2b8
[   30.172346]  kasan_report+0x1e8/0x250
[   30.176102]  __asan_load8+0x98/0xe0
[   30.179682]  prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]
[   30.186847]  prestera_netdev_event_handler+0x1b4/0x1c0 [prestera]
[   30.193313]  raw_notifier_call_chain+0x74/0xa0
[   30.197860]  call_netdevice_notifiers_info+0x68/0xc0
[   30.202924]  register_netdevice+0x3cc/0x760
[   30.207190]  register_netdev+0x24/0x50
[   30.211015]  prestera_device_register+0x8a0/0xba0 [prestera]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47104</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()

The wrong goto label was used for the error case and missed cleanup of the
pkt allocation.

Addresses-Coverity-ID: 1493352 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47105</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47105" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: xsk: return xsk buffers back to pool when cleaning the ring

Currently we only NULL the xdp_buff pointer in the internal SW ring but
we never give it back to the xsk buffer pool. This means that buffers
can be leaked out of the buff pool and never be used again.

Add missing xsk_buff_free() call to the routine that is supposed to
clean the entries that are left in the ring so that these buffers in the
umem can be used by other sockets.

Also, only go through the space that is actually left to be cleaned
instead of a whole ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47107</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47107" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix READDIR buffer overflow

If a client sends a READDIR count argument that is too small (say,
zero), then the buffer size calculation in the new init_dirlist
helper functions results in an underflow, allowing the XDR stream
functions to write beyond the actual buffer.

This calculation has always been suspect. NFSD has never sanity-
checked the READDIR count argument, but the old entry encoders
managed the problem correctly.

With the commits below, entry encoding changed, exposing the
underflow to the pointer arithmetic in xdr_reserve_space().

Modern NFS clients attempt to retrieve as much data as possible
for each READDIR request. Also, we have no unit tests that
exercise the behavior of READDIR at the lower bound of @count
values. Thus this case was missed during testing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47108</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47108" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf

In commit 41ca9caaae0b
("drm/mediatek: hdmi: Add check for CEA modes only") a check
for CEA modes was added to function mtk_hdmi_bridge_mode_valid()
in order to address possible issues on MT8167;
moreover, with commit c91026a938c2
("drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock")
another similar check was introduced.

Unfortunately though, at the time of writing, MT8173 does not provide
any mtk_hdmi_conf structure and this is crashing the kernel with NULL
pointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as
soon as a HDMI cable gets plugged in.

To fix this regression, add a NULL pointer check for hdmi-&gt;conf in the
said function, restoring HDMI functionality and avoiding NULL pointer
kernel panics.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47181</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: tusb6010: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47182</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix scsi_mode_sense() buffer length handling

Several problems exist with scsi_mode_sense() buffer length handling:

 1) The allocation length field of the MODE SENSE(10) command is 16-bits,
    occupying bytes 7 and 8 of the CDB. With this command, access to mode
    pages larger than 255 bytes is thus possible. However, the CDB
    allocation length field is set by assigning len to byte 8 only, thus
    truncating buffer length larger than 255.

 2) If scsi_mode_sense() is called with len smaller than 8 with
    sdev-&gt;use_10_for_ms set, or smaller than 4 otherwise, the buffer length
    is increased to 8 and 4 respectively, and the buffer is zero filled
    with these increased values, thus corrupting the memory following the
    buffer.

Fix these 2 problems by using put_unaligned_be16() to set the allocation
length field of MODE SENSE(10) CDB and by returning an error when len is
too small.

Furthermore, if len is larger than 255B, always try MODE SENSE(10) first,
even if the device driver did not set sdev-&gt;use_10_for_ms. In case of
invalid opcode error for MODE SENSE(10), access to mode pages larger than
255 bytes are not retried using MODE SENSE(6). To avoid buffer length
overflows for the MODE_SENSE(10) case, check that len is smaller than 65535
bytes.

While at it, also fix the folowing:

 * Use get_unaligned_be16() to retrieve the mode data length and block
   descriptor length fields of the mode sense reply header instead of using
   an open coded calculation.

 * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable
   Block Descriptor, which is the opposite of what the dbd argument
   description was.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47183</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix link down processing to address NULL pointer dereference

If an FC link down transition while PLOGIs are outstanding to fabric well
known addresses, outstanding ABTS requests may result in a NULL pointer
dereference. Driver unload requests may hang with repeated "2878" log
messages.

The Link down processing results in ABTS requests for outstanding ELS
requests. The Abort WQEs are sent for the ELSs before the driver had set
the link state to down. Thus the driver is sending the Abort with the
expectation that an ABTS will be sent on the wire. The Abort request is
stalled waiting for the link to come up. In some conditions the driver may
auto-complete the ELSs thus if the link does come up, the Abort completions
may reference an invalid structure.

Fix by ensuring that Abort set the flag to avoid link traffic if issued due
to conditions where the link failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47184</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL ptr dereference on VSI filter sync

Remove the reason of null pointer dereference in sync VSI filters.
Added new I40E_VSI_RELEASING flag to signalize deleting and releasing
of VSI resources to sync this thread with sync filters subtask.
Without this patch it is possible to start update the VSI filter list
after VSI is removed, that's causing a kernel oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47185</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc

When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,
which look like this one:

  Workqueue: events_unbound flush_to_ldisc
  Call trace:
   dump_backtrace+0x0/0x1ec
   show_stack+0x24/0x30
   dump_stack+0xd0/0x128
   panic+0x15c/0x374
   watchdog_timer_fn+0x2b8/0x304
   __run_hrtimer+0x88/0x2c0
   __hrtimer_run_queues+0xa4/0x120
   hrtimer_interrupt+0xfc/0x270
   arch_timer_handler_phys+0x40/0x50
   handle_percpu_devid_irq+0x94/0x220
   __handle_domain_irq+0x88/0xf0
   gic_handle_irq+0x84/0xfc
   el1_irq+0xc8/0x180
   slip_unesc+0x80/0x214 [slip]
   tty_ldisc_receive_buf+0x64/0x80
   tty_port_default_receive_buf+0x50/0x90
   flush_to_ldisc+0xbc/0x110
   process_one_work+0x1d4/0x4b0
   worker_thread+0x180/0x430
   kthread+0x11c/0x120

In the testcase pty04, The first process call the write syscall to send
data to the pty master. At the same time, the workqueue will do the
flush_to_ldisc to pop data in a loop until there is no more data left.
When the sender and workqueue running in different core, the sender sends
data fastly in full time which will result in workqueue doing work in loop
for a long time and occuring softlockup in flush_to_ldisc with kernel
configured without preempt. So I add need_resched check and cond_resched
in the flush_to_ldisc loop to avoid it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47187</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency

The entry/exit latency and minimum residency in state for the idle
states of MSM8998 were ..bad: first of all, for all of them the
timings were written for CPU sleep but the min-residency-us param
was miscalculated (supposedly, while porting this from downstream);
Then, the power collapse states are setting PC on both the CPU
cluster *and* the L2 cache, which have different timings: in the
specific case of L2 the times are higher so these ones should be
taken into account instead of the CPU ones.

This parameter misconfiguration was not giving particular issues
because on MSM8998 there was no CPU scaling at all, so cluster/L2
power collapse was rarely (if ever) hit.
When CPU scaling is enabled, though, the wrong timings will produce
SoC unstability shown to the user as random, apparently error-less,
sudden reboots and/or lockups.

This set of parameters are stabilizing the SoC when CPU scaling is
ON and when power collapse is frequently hit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47188</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Improve SCSI abort handling

The following has been observed on a test setup:

WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c
Call trace:
 ufshcd_queuecommand+0x468/0x65c
 scsi_send_eh_cmnd+0x224/0x6a0
 scsi_eh_test_devices+0x248/0x418
 scsi_eh_ready_devs+0xc34/0xe58
 scsi_error_handler+0x204/0x80c
 kthread+0x150/0x1b4
 ret_from_fork+0x10/0x30

That warning is triggered by the following statement:

	WARN_ON(lrbp-&gt;cmd);

Fix this warning by clearing lrbp-&gt;cmd from the abort handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47189</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory ordering between normal and ordered work functions

Ordered work functions aren't guaranteed to be handled by the same thread
which executed the normal work functions. The only way execution between
normal/ordered functions is synchronized is via the WORK_DONE_BIT,
unfortunately the used bitops don't guarantee any ordering whatsoever.

This manifested as seemingly inexplicable crashes on ARM64, where
async_chunk::inode is seen as non-null in async_cow_submit which causes
submit_compressed_extents to be called and crash occurs because
async_chunk::inode suddenly became NULL. The call trace was similar to:

    pc : submit_compressed_extents+0x38/0x3d0
    lr : async_cow_submit+0x50/0xd0
    sp : ffff800015d4bc20

    &lt;registers omitted for brevity&gt;

    Call trace:
     submit_compressed_extents+0x38/0x3d0
     async_cow_submit+0x50/0xd0
     run_ordered_work+0xc8/0x280
     btrfs_work_helper+0x98/0x250
     process_one_work+0x1f0/0x4ac
     worker_thread+0x188/0x504
     kthread+0x110/0x114
     ret_from_fork+0x10/0x18

Fix this by adding respective barrier calls which ensure that all
accesses preceding setting of WORK_DONE_BIT are strictly ordered before
setting the flag. At the same time add a read barrier after reading of
WORK_DONE_BIT in run_ordered_work which ensures all subsequent loads
would be strictly ordered after reading the bit. This in turn ensures
are all accesses before WORK_DONE_BIT are going to be strictly ordered
before any access that can occur in ordered_func.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47191</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()

The following warning was observed running syzkaller:

[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;
[ 3813.830724]    program syz-executor not setting count and/or reply_len properly
[ 3813.836956] ==================================================================
[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0
[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549
[ 3813.846612] Call Trace:
[ 3813.846995]  dump_stack+0x108/0x15f
[ 3813.847524]  print_address_description+0xa5/0x372
[ 3813.848243]  kasan_report.cold+0x236/0x2a8
[ 3813.849439]  check_memory_region+0x240/0x270
[ 3813.850094]  memcpy+0x30/0x80
[ 3813.850553]  sg_copy_buffer+0x157/0x1e0
[ 3813.853032]  sg_copy_from_buffer+0x13/0x20
[ 3813.853660]  fill_from_dev_buffer+0x135/0x370
[ 3813.854329]  resp_readcap16+0x1ac/0x280
[ 3813.856917]  schedule_resp+0x41f/0x1630
[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0
[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950
[ 3813.863329]  scsi_request_fn+0xd8e/0x1710
[ 3813.863946]  __blk_run_queue+0x10b/0x230
[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400
[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420
[ 3813.871637]  sg_write+0x6c8/0xef0
[ 3813.878853]  __vfs_write+0xe4/0x800
[ 3813.883487]  vfs_write+0x17b/0x530
[ 3813.884008]  ksys_write+0x103/0x270
[ 3813.886268]  __x64_sys_write+0x77/0xc0
[ 3813.886841]  do_syscall_64+0x106/0x360
[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

This issue can be reproduced with the following syzkaller log:

r0 = openat(0xffffffffffffff9c, &amp;(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &amp;(0x7f0000000000)='fd/3\x00')
open_by_handle_at(r1, &amp;(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)
r2 = syz_open_dev$sg(&amp;(0x7f0000000000), 0x0, 0x40782)
write$binfmt_aout(r2, &amp;(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126)

In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass
the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This
leads to OOB in sg_copy_buffer().

To solve this issue, define alloc_len as u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: sysfs: Fix hang when device state is set via sysfs

This fixes a regression added with:

commit f0f82e2476f6 ("scsi: core: Fix capacity set to zero after
offlinining device")

The problem is that after iSCSI recovery, iscsid will call into the kernel
to set the dev's state to running, and with that patch we now call
scsi_rescan_device() with the state_mutex held. If the SCSI error handler
thread is just starting to test the device in scsi_send_eh_cmnd() then it's
going to try to grab the state_mutex.

We are then stuck, because when scsi_rescan_device() tries to send its I/O
scsi_queue_rq() calls -&gt; scsi_host_queue_ready() -&gt; scsi_host_in_recovery()
which will return true (the host state is still in recovery) and I/O will
just be requeued. scsi_send_eh_cmnd() will then never be able to grab the
state_mutex to finish error handling.

To prevent the deadlock move the rescan-related code to after we drop the
state_mutex.

This also adds a check for if we are already in the running state. This
prevents extra scans and helps the iscsid case where if the transport class
has already onlined the device during its recovery process then we don't
need userspace to do it again plus possibly block that daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Fix memory leak during rmmod

Driver failed to release all memory allocated. This would lead to memory
leak during driver removal.

Properly free memory when the module is removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: call cfg80211_stop_ap when switch from P2P_GO type

If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata-&gt;assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free of the add_lock mutex

Commit 6098475d4cb4 ("spi: Fix deadlock when adding SPI controllers on
SPI buses") introduced a per-controller mutex. But mutex_unlock() of
said lock is called after the controller is already freed:

  spi_unregister_controller(ctlr)
  -&gt; put_device(&amp;ctlr-&gt;dev)
    -&gt; spi_controller_release(dev)
  -&gt; mutex_unlock(&amp;ctrl-&gt;add_lock)

Move the put_device() after the mutex_unlock().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47196</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Set send and receive CQ before forwarding to the driver

Preset both receive and send CQ pointers prior to call to the drivers and
overwrite it later again till the mlx4 is going to be changed do not
overwrite ibqp properties.

This change is needed for mlx5, because in case of QP creation failure, it
will go to the path of QP destroy which relies on proper CQ pointers.

 BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]
 Write of size 8 at addr ffff8880064c55c0 by task a.out/246

 CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Call Trace:
  dump_stack_lvl+0x45/0x59
  print_address_description.constprop.0+0x1f/0x140
  kasan_report.cold+0x83/0xdf
  create_qp.cold+0x164/0x16e [mlx5_ib]
  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]
  create_qp.part.0+0x45b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Allocated by task 246:
  kasan_save_stack+0x1b/0x40
  __kasan_kmalloc+0xa4/0xd0
  create_qp.part.0+0x92/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Freed by task 246:
  kasan_save_stack+0x1b/0x40
  kasan_set_track+0x1c/0x30
  kasan_set_free_info+0x20/0x30
  __kasan_slab_free+0x10c/0x150
  slab_free_freelist_hook+0xb4/0x1b0
  kfree+0xe7/0x2a0
  create_qp.part.0+0x52b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47197</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: nullify cq-&gt;dbg pointer in mlx5_debug_cq_remove()

Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds
to rest of destroy operations. mlx5_core_destroy_cq() could be called again
by user and cause additional call of mlx5_debug_cq_remove().
cq-&gt;dbg was not nullify in previous call and cause the crash.

Fix it by nullify cq-&gt;dbg pointer after removal.

Also proceed to destroy operations only if FW return 0
for MLX5_CMD_OP_DESTROY_CQ command.

general protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI
CPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:lockref_get+0x1/0x60
Code: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02
00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 &lt;48&gt; 8b 17
48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48
RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe
RDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058
RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000
R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0
FS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0
Call Trace:
  simple_recursive_removal+0x33/0x2e0
  ? debugfs_remove+0x60/0x60
  debugfs_remove+0x40/0x60
  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]
  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]
  devx_obj_cleanup+0x151/0x330 [mlx5_ib]
  ? __pollwait+0xd0/0xd0
  ? xas_load+0x5/0x70
  ? xa_load+0x62/0xa0
  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]
  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]
  uobj_destroy+0x54/0xa0 [ib_uverbs]
  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]
  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]
  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]
  __x64_sys_ioctl+0x3e4/0x8e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47198</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine

An error is detected with the following report when unloading the driver:
  "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"

The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the
flag is not cleared upon completion of the login.

This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set
to LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used
as an rpi_ids array index.

Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in
lpfc_mbx_cmpl_fc_reg_login().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47199</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT, Fix multiple allocations and memleak of mod acts

CT clear action offload adds additional mod hdr actions to the
flow's original mod actions in order to clear the registers which
hold ct_state.
When such flow also includes encap action, a neigh update event
can cause the driver to unoffload the flow and then reoffload it.

Each time this happens, the ct clear handling adds that same set
of mod hdr actions to reset ct_state until the max of mod hdr
actions is reached.

Also the driver never releases the allocated mod hdr actions and
causing a memleak.

Fix above two issues by moving CT clear mod acts allocation
into the parsing actions phase and only use it when offloading the rule.
The release of mod acts will be done in the normal flow_put().

 backtrace:
    [&lt;000000007316e2f3&gt;] krealloc+0x83/0xd0
    [&lt;00000000ef157de1&gt;] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]
    [&lt;00000000970ce4ae&gt;] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]
    [&lt;0000000067c5fa17&gt;] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]
    [&lt;00000000d032eb98&gt;] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]
    [&lt;00000000fd23b869&gt;] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]
    [&lt;000000004fc24acc&gt;] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]
    [&lt;00000000dc741c17&gt;] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]
    [&lt;00000000e92e49d7&gt;] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]
    [&lt;00000000f60f5602&gt;] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47200</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap

drm_gem_ttm_mmap() drops a reference to the gem object on success. If
the gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that
drop will free the gem object, and the subsequent drm_gem_object_get()
will be a UAF. Fix by grabbing a reference before calling the mmap
helper.

This issue was forseen when the reference dropping was adding in
commit 9786b65bc61ac ("drm/ttm: fix mmap refcounting"):
  "For that to work properly the drm_gem_object_get() call in
  drm_gem_ttm_mmap() must be moved so it happens before calling
  obj-&gt;funcs-&gt;mmap(), otherwise the gem refcount would go down
  to zero."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47201</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: free q_vectors before queues in iavf_disable_vf

iavf_free_queues() clears adapter-&gt;num_active_queues, which
iavf_free_q_vectors() relies on, so swap the order of these two function
calls in iavf_disable_vf(). This resolves a panic encountered when the
interface is disabled and then later brought up again after PF
communication is restored.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47202</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: Fix NULL pointer dereferences in of_thermal_ functions

of_parse_thermal_zones() parses the thermal-zones node and registers a
thermal_zone device for each subnode. However, if a thermal zone is
consuming a thermal sensor and that thermal sensor device hasn't probed
yet, an attempt to set trip_point_*_temp for that thermal zone device
can cause a NULL pointer dereference. Fix it.

 console:/sys/class/thermal/thermal_zone87 # echo 120000 &gt; trip_point_0_temp
 ...
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
 ...
 Call trace:
  of_thermal_set_trip_temp+0x40/0xc4
  trip_point_temp_store+0xc0/0x1dc
  dev_attr_store+0x38/0x88
  sysfs_kf_write+0x64/0xc0
  kernfs_fop_write_iter+0x108/0x1d0
  vfs_write+0x2f4/0x368
  ksys_write+0x7c/0xec
  __arm64_sys_write+0x20/0x30
  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc
  do_el0_svc+0x28/0xa0
  el0_svc+0x14/0x24
  el0_sync_handler+0x88/0xec
  el0_sync+0x1c0/0x200

While at it, fix the possible NULL pointer dereference in other
functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),
of_thermal_get_trend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47203</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()

When parsing the txq list in lpfc_drain_txq(), the driver attempts to pass
the requests to the adapter. If such an attempt fails, a local "fail_msg"
string is set and a log message output.  The job is then added to a
completions list for cancellation.

Processing of any further jobs from the txq list continues, but since
"fail_msg" remains set, jobs are added to the completions list regardless
of whether a wqe was passed to the adapter.  If successfully added to
txcmplq, jobs are added to both lists resulting in list corruption.

Fix by clearing the fail_msg string after adding a job to the completions
list. This stops the subsequent jobs from being added to the completions
list unless they had an appropriate failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47204</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove

Access to netdev after free_netdev() will cause use-after-free bug.
Move debug log before free_netdev() call to avoid it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47205</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: Unregister clocks/resets when unbinding

Currently, unbinding a CCU driver unmaps the device's MMIO region, while
leaving its clocks/resets and their providers registered. This can cause
a page fault later when some clock operation tries to perform MMIO. Fix
this by separating the CCU initialization from the memory allocation,
and then using a devres callback to unregister the clocks and resets.

This also fixes a memory leak of the `struct ccu_reset`, and uses the
correct owner (the specific platform driver) for the clocks and resets.

Early OF clock providers are never unregistered, and limited error
handling is possible, so they are mostly unchanged. The error reporting
is made more consistent by moving the message inside of_sunxi_ccu_probe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: ohci-tmio: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47207</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: gus: fix null pointer dereference on pointer block

The pointer block return from snd_gf1_dma_next_block could be
null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47209</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Prevent dead task groups from regaining cfs_rq's

Kevin is reporting crashes which point to a use-after-free of a cfs_rq
in update_blocked_averages(). Initial debugging revealed that we've
live cfs_rq's (on_list=1) in an about to be kfree()'d task group in
free_fair_sched_group(). However, it was unclear how that can happen.

His kernel config happened to lead to a layout of struct sched_entity
that put the 'my_q' member directly into the middle of the object
which makes it incidentally overlap with SLUB's freelist pointer.
That, in combination with SLAB_FREELIST_HARDENED's freelist pointer
mangling, leads to a reliable access violation in form of a #GP which
made the UAF fail fast.

Michal seems to have run into the same issue[1]. He already correctly
diagnosed that commit a7b359fc6a37 ("sched/fair: Correctly insert
cfs_rq's to list on unthrottle") is causing the preconditions for the
UAF to happen by re-adding cfs_rq's also to task groups that have no
more running tasks, i.e. also to dead ones. His analysis, however,
misses the real root cause and it cannot be seen from the crash
backtrace only, as the real offender is tg_unthrottle_up() getting
called via sched_cfs_period_timer() via the timer interrupt at an
inconvenient time.

When unregister_fair_sched_group() unlinks all cfs_rq's from the dying
task group, it doesn't protect itself from getting interrupted. If the
timer interrupt triggers while we iterate over all CPUs or after
unregister_fair_sched_group() has finished but prior to unlinking the
task group, sched_cfs_period_timer() will execute and walk the list of
task groups, trying to unthrottle cfs_rq's, i.e. re-add them to the
dying task group. These will later -- in free_fair_sched_group() -- be
kfree()'ed while still being linked, leading to the fireworks Kevin
and Michal are seeing.

To fix this race, ensure the dying task group gets unlinked first.
However, simply switching the order of unregistering and unlinking the
task group isn't sufficient, as concurrent RCU walkers might still see
it, as can be seen below:

    CPU1:                                      CPU2:
      :                                        timer IRQ:
      :                                          do_sched_cfs_period_timer():
      :                                            :
      :                                            distribute_cfs_runtime():
      :                                              rcu_read_lock();
      :                                              :
      :                                              unthrottle_cfs_rq():
    sched_offline_group():                             :
      :                                                walk_tg_tree_from(…,tg_unthrottle_up,…):
      list_del_rcu(&amp;tg-&gt;list);                           :
 (1)  :                                                  list_for_each_entry_rcu(child, &amp;parent-&gt;children, siblings)
      :                                                    :
 (2)  list_del_rcu(&amp;tg-&gt;siblings);                         :
      :                                                    tg_unthrottle_up():
      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-&gt;cfs_rq[cpu_of(rq)];
        :                                                    :
        list_del_leaf_cfs_rq(tg-&gt;cfs_rq[cpu]);               :
        :                                                    :
        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-&gt;nr_running)
 (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);
      :                                                      :
      :                                                    :
      :                                                  :
      :                                                :
      :                           
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47210</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Remove WARN_ON in tps6598x_block_read

Calling tps6598x_block_read with a higher than allowed len can be
handled by just returning an error. There's no need to crash systems
with panic-on-warn enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47211</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: fix null pointer dereference on pointer cs_desc

The pointer cs_desc return from snd_usb_find_clock_source could
be null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47212</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Update error handler for UCTX and UMEM

In the fast unload flow, the device state is set to internal error,
which indicates that the driver started the destroy process.
In this case, when a destroy command is being executed, it should return
MLX5_CMD_STAT_OK.
Fix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK
instead of EIO.

This fixes a call trace in the umem release process -
[ 2633.536695] Call Trace:
[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]
[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]
[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]
[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]
[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]
[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]
[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]
[ 2633.544661]  device_release_driver_internal+0x103/0x1f0
[ 2633.545679]  bus_remove_device+0xf7/0x170
[ 2633.546640]  device_del+0x181/0x410
[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]
[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]
[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]
[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]
[ 2633.551819]  pci_device_remove+0x3b/0xc0
[ 2633.552731]  device_release_driver_internal+0x103/0x1f0
[ 2633.553746]  unbind_store+0xf6/0x130
[ 2633.554657]  kernfs_fop_write+0x116/0x190
[ 2633.555567]  vfs_write+0xa5/0x1a0
[ 2633.556407]  ksys_write+0x4f/0xb0
[ 2633.557233]  do_syscall_64+0x5b/0x1a0
[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 2633.559018] RIP: 0033:0x7f9977132648
[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55
[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648
[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001
[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740
[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0
[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c
[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47215</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: kTLS, Fix crash in RX resync flow

For the TLS RX resync flow, we maintain a list of TLS contexts
that require some attention, to communicate their resync information
to the HW.
Here we fix list corruptions, by protecting the entries against
movements coming from resync_handle_seq_match(), until their resync
handling in napi is fully completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47216</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: advansys: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long' and printed with %lx.

Change %lx to %p to print the hashed pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47217</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails

Check for a valid hv_vp_index array prior to derefencing hv_vp_index when
setting Hyper-V's TSC change callback.  If Hyper-V setup failed in
hyperv_init(), the kernel will still report that it's running under
Hyper-V, but will have silently disabled nearly all functionality.

  BUG: kernel NULL pointer dereference, address: 0000000000000010
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0
  Code: &lt;8b&gt; 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08
  ...
  Call Trace:
   kvm_arch_init+0x17c/0x280
   kvm_init+0x31/0x330
   vmx_init+0xba/0x13a
   do_one_initcall+0x41/0x1c0
   kernel_init_freeable+0x1f2/0x23b
   kernel_init+0x16/0x120
   ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: fix NULL-pointer dereference when hashtab allocation fails

When the hash table slot array allocation fails in hashtab_init(),
h-&gt;size is left initialized with a non-zero value, but the h-&gt;htable
pointer is NULL. This may then cause a NULL pointer dereference, since
the policydb code relies on the assumption that even after a failed
hashtab_init(), hashtab_map() and hashtab_destroy() can be safely called
on it. Yet, these detect an empty hashtab only by looking at the size.

Fix this by making sure that hashtab_init() always leaves behind a valid
empty hashtab when the allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47219</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()

The following issue was observed running syzkaller:

BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]
BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
Read of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815

CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xe4/0x14a lib/dump_stack.c:118
 print_address_description+0x73/0x280 mm/kasan/report.c:253
 kasan_report_error mm/kasan/report.c:352 [inline]
 kasan_report+0x272/0x370 mm/kasan/report.c:410
 memcpy+0x1f/0x50 mm/kasan/kasan.c:302
 memcpy include/linux/string.h:377 [inline]
 sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
 fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021
 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772
 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429
 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835
 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896
 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034
 __blk_run_queue_uncond block/blk-core.c:464 [inline]
 __blk_run_queue+0x1a4/0x380 block/blk-core.c:484
 blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78
 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847
 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716
 sg_write+0x64/0xa0 drivers/scsi/sg.c:622
 __vfs_write+0xed/0x690 fs/read_write.c:485
kill_bdev:block_device:00000000e138492c
 vfs_write+0x184/0x4c0 fs/read_write.c:549
 ksys_write+0x107/0x240 fs/read_write.c:599
 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

We get 'alen' from command its type is int. If userspace passes a large
length we will get a negative 'alen'.

Switch n, alen, and rlen to u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47358</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47358" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: greybus: uart: fix tty use after free

User space can hold a tty open indefinitely and tty drivers must not
release the underlying structures until the last user is gone.

Switch to using the tty-port reference counter to manage the life time
of the greybus tty state to avoid use after free after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47359</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47359" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix soft lockup during fsstress

Below traces are observed during fsstress and system got hung.
[  130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47360</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47360" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: make sure fd closes complete

During BC_FREE_BUFFER processing, the BINDER_TYPE_FDA object
cleanup may close 1 or more fds. The close operations are
completed using the task work mechanism -- which means the thread
needs to return to userspace or the file object may never be
dereferenced -- which can lead to hung processes.

Force the binder thread back to userspace if an fd is closed during
BC_FREE_BUFFER handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47361</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47361" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mcb: fix error handling in mcb_alloc_bus()

There are two bugs:
1) If ida_simple_get() fails then this code calls put_device(carrier)
   but we haven't yet called get_device(carrier) and probably that
   leads to a use after free.
2) After device_initialize() then we need to use put_device() to
   release the bus.  This will free the internal resources tied to the
   device and call mcb_free_bus() which will free the rest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47362</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47362" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Update intermediate power state for SI

Update the current state as boot state during dpm initialization.
During the subsequent initialization, set_power_state gets called to
transition to the final power state. set_power_state refers to values
from the current state and without current state populated, it could
result in NULL pointer dereference.

For ex: on platforms where PCI speed change is supported through ACPI
ATCS method, the link speed of current state needs to be queried before
deciding on changing to final power state's link speed. The logic to query
ATCS-support was broken on certain platforms. The issue became visible
when broken ATCS-support logic got fixed with commit
f9b7f3703ff9 ("drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)").

Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47363</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix division by zero while replacing a resilient group

The resilient nexthop group torture tests in fib_nexthop.sh exposed a
possible division by zero while replacing a resilient group [1]. The
division by zero occurs when the data path sees a resilient nexthop
group with zero buckets.

The tests replace a resilient nexthop group in a loop while traffic is
forwarded through it. The tests do not specify the number of buckets
while performing the replacement, resulting in the kernel allocating a
stub resilient table (i.e, 'struct nh_res_table') with zero buckets.

This table should never be visible to the data path, but the old nexthop
group (i.e., 'oldg') might still be used by the data path when the stub
table is assigned to it.

Fix this by only assigning the stub table to the old nexthop group after
making sure the group is no longer used by the data path.

Tested with fib_nexthops.sh:

Tests passed: 222
Tests failed:   0

[1]
 divide error: 0000 [#1] PREEMPT SMP KASAN
 CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:nexthop_select_path+0x2d2/0x1a80
[...]
 Call Trace:
  fib_select_multipath+0x79b/0x1530
  fib_select_path+0x8fb/0x1c10
  ip_route_output_key_hash_rcu+0x1198/0x2da0
  ip_route_output_key_hash+0x190/0x340
  ip_route_output_flow+0x21/0x120
  raw_sendmsg+0x91d/0x2e10
  inet_sendmsg+0x9e/0xe0
  __sys_sendto+0x23d/0x360
  __x64_sys_sendto+0xe1/0x1b0
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47364</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix memory leak in compat_insnlist()

`compat_insnlist()` handles the 32-bit version of the `COMEDI_INSNLIST`
ioctl (whenwhen `CONFIG_COMPAT` is enabled).  It allocates memory to
temporarily hold an array of `struct comedi_insn` converted from the
32-bit version in user space.  This memory is only being freed if there
is a fault while filling the array, otherwise it is leaked.

Add a call to `kfree()` to fix the leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47365</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix page leak

There's a loop in afs_extend_writeback() that adds extra pages to a write
we want to make to improve the efficiency of the writeback by making it
larger.  This loop stops, however, if we hit a page we can't write back
from immediately, but it doesn't get rid of the page ref we speculatively
acquired.

This was caused by the removal of the cleanup loop when the code switched
from using find_get_pages_contig() to xarray scanning as the latter only
gets a single page at a time, not a batch.

Fix this by putting the page on a ref on an early break from the loop.
Unfortunately, we can't just add that page to the pagevec we're employing
as we'll go through that and add those pages to the RPC call.

This was found by the generic/074 test.  It leaks ~4GiB of RAM each time it
is run - which can be observed with "top".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47366</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47366" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server

AFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and
Linux's afs client switches between them when talking to a non-YFS server
if the read size, the file position or the sum of the two have the upper 32
bits set of the 64-bit value.

This is a problem, however, since the file position and length fields of
FS.FetchData are *signed* 32-bit values.

Fix this by capturing the capability bits obtained from the fileserver when
it's sent an FS.GetCapabilities RPC, rather than just discarding them, and
then picking out the VICED_CAPABILITY_64BITFILES flag.  This can then be
used to decide whether to use FS.FetchData or FS.FetchData64 - and also
FS.StoreData or FS.StoreData64 - rather than using upper_32_bits() to
switch on the parameter values.

This capabilities flag could also be used to limit the maximum size of the
file, but all servers must be checked for that.

Note that the issue does not exist with FS.StoreData - that uses *unsigned*
32-bit values.  It's also not a problem with Auristor servers as its
YFS.FetchData64 op uses unsigned 64-bit values.

This can be tested by cloning a git repo through an OpenAFS client to an
OpenAFS server and then doing "git status" on it from a Linux afs
client[1].  Provided the clone has a pack file that's in the 2G-4G range,
the git status will show errors like:

	error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
	error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index

This can be observed in the server's FileLog with something like the
following appearing:

Sun Aug 29 19:31:39 2021 SRXAFS_FetchData, Fid = 2303380852.491776.3263114, Host 192.168.11.201:7001, Id 1001
Sun Aug 29 19:31:39 2021 CheckRights: len=0, for host=192.168.11.201:7001
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: Pos 18446744071815340032, Len 3154
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: file size 2400758866
...
Sun Aug 29 19:31:40 2021 SRXAFS_FetchData returns 5

Note the file position of 18446744071815340032.  This is the requested file
position sign-extended.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47367</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47367" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix pages leaking when building skb in big mode

We try to use build_skb() if we had sufficient tailroom. But we forget
to release the unused pages chained via private in big mode which will
leak pages. Fixing this by release the pages after building the skb in
big mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47368</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47368" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

enetc: Fix illegal access when reading affinity_hint

irq_set_affinity_hit() stores a reference to the cpumask_t
parameter in the irq descriptor, and that reference can be
accessed later from irq_affinity_hint_proc_show(). Since
the cpu_mask parameter passed to irq_set_affinity_hit() has
only temporary storage (it's on the stack memory), later
accesses to it are illegal. Thus reads from the corresponding
procfs affinity_hint file can result in paging request oops.

The issue is fixed by the get_cpu_mask() helper, which provides
a permanent storage for the cpumask_t parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47369</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47369" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix NULL deref in qeth_clear_working_pool_list()

When qeth_set_online() calls qeth_clear_working_pool_list() to roll
back after an error exit from qeth_hardsetup_card(), we are at risk of
accessing card-&gt;qdio.in_q before it was allocated by
qeth_alloc_qdio_queues() via qeth_mpc_initialize().

qeth_clear_working_pool_list() then dereferences NULL, and by writing to
queue-&gt;bufs[i].pool_entry scribbles all over the CPU's lowcore.
Resulting in a crash when those lowcore areas are used next (eg. on
the next machine-check interrupt).

Such a scenario would typically happen when the device is first set
online and its queues aren't allocated yet. An early IO error or certain
misconfigs (eg. mismatched transport mode, bad portno) then cause us to
error out from qeth_hardsetup_card() with card-&gt;qdio.in_q still being
NULL.

Fix it by checking the pointer for NULL before accessing it.

Note that we also have (rare) paths inside qeth_mpc_initialize() where
a configuration change can cause us to free the existing queues,
expecting that subsequent code will allocate them again. If we then
error out before that re-allocation happens, the same bug occurs.

Root-caused-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227324">SUSE bug 1227324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47370</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47370" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure tx skbs always have the MPTCP ext

Due to signed/unsigned comparison, the expression:

	info-&gt;size_goal - skb-&gt;len &gt; 0

evaluates to true when the size goal is smaller than the
skb size. That results in lack of tx cache refill, so that
the skb allocated by the core TCP code lacks the required
MPTCP skb extensions.

Due to the above, syzbot is able to trigger the following WARN_ON():

WARNING: CPU: 1 PID: 810 at net/mptcp/protocol.c:1366 mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Modules linked in:
CPU: 1 PID: 810 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Code: ff 4c 8b 74 24 50 48 8b 5c 24 58 e9 0f fb ff ff e8 13 44 8b f8 4c 89 e7 45 31 ed e8 98 57 2e fe e9 81 f4 ff ff e8 fe 43 8b f8 &lt;0f&gt; 0b 41 bd ea ff ff ff e9 6f f4 ff ff 4c 89 e7 e8 b9 8e d2 f8 e9
RSP: 0018:ffffc9000531f6a0 EFLAGS: 00010216
RAX: 000000000000697f RBX: 0000000000000000 RCX: ffffc90012107000
RDX: 0000000000040000 RSI: ffffffff88eac9e2 RDI: 0000000000000003
RBP: ffff888078b15780 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff88eac017 R11: 0000000000000000 R12: ffff88801de0a280
R13: 0000000000006b58 R14: ffff888066278280 R15: ffff88803c2fe9c0
FS:  00007fd9f866e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faebcb2f718 CR3: 00000000267cb000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __mptcp_push_pending+0x1fb/0x6b0 net/mptcp/protocol.c:1547
 mptcp_release_cb+0xfe/0x210 net/mptcp/protocol.c:3003
 release_sock+0xb4/0x1b0 net/core/sock.c:3206
 sk_stream_wait_memory+0x604/0xed0 net/core/stream.c:145
 mptcp_sendmsg+0xc39/0x1bc0 net/mptcp/protocol.c:1749
 inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:643
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 sock_write_iter+0x2a0/0x3e0 net/socket.c:1057
 call_write_iter include/linux/fs.h:2163 [inline]
 new_sync_write+0x40b/0x640 fs/read_write.c:507
 vfs_write+0x7cf/0xae0 fs/read_write.c:594
 ksys_write+0x1ee/0x250 fs/read_write.c:647
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd9f866e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9
RDX: 00000000000e7b78 RSI: 0000000020000000 RDI: 0000000000000003
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038
R13: 0000000000a9fb1f R14: 00007fd9f866e300 R15: 0000000000022000

Fix the issue rewriting the relevant expression to avoid
sign-related problems - note: size_goal is always &gt;= 0.

Additionally, ensure that the skb in the tx cache always carries
the relevant extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47371</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47371" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix memory leaks in nexthop notification chain listeners

syzkaller discovered memory leaks [1] that can be reduced to the
following commands:

 # ip nexthop add id 1 blackhole
 # devlink dev reload pci/0000:06:00.0

As part of the reload flow, mlxsw will unregister its netdevs and then
unregister from the nexthop notification chain. Before unregistering
from the notification chain, mlxsw will receive delete notifications for
nexthop objects using netdevs registered by mlxsw or their uppers. mlxsw
will not receive notifications for nexthops using netdevs that are not
dismantled as part of the reload flow. For example, the blackhole
nexthop above that internally uses the loopback netdev as its nexthop
device.

One way to fix this problem is to have listeners flush their nexthop
tables after unregistering from the notification chain. This is
error-prone as evident by this patch and also not symmetric with the
registration path where a listener receives a dump of all the existing
nexthops.

Therefore, fix this problem by replaying delete notifications for the
listener being unregistered. This is symmetric to the registration path
and also consistent with the netdev notification chain.

The above means that unregister_nexthop_notifier(), like
register_nexthop_notifier(), will have to take RTNL in order to iterate
over the existing nexthops and that any callers of the function cannot
hold RTNL. This is true for mlxsw and netdevsim, but not for the VXLAN
driver. To avoid a deadlock, change the latter to unregister its nexthop
listener without holding RTNL, making it symmetric to the registration
path.

[1]
unreferenced object 0xffff88806173d600 (size 512):
  comm "syz-executor.0", pid 1290, jiffies 4295583142 (age 143.507s)
  hex dump (first 32 bytes):
    41 9d 1e 60 80 88 ff ff 08 d6 73 61 80 88 ff ff  A..`......sa....
    08 d6 73 61 80 88 ff ff 01 00 00 00 00 00 00 00  ..sa............
  backtrace:
    [&lt;ffffffff81a6b576&gt;] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline]
    [&lt;ffffffff81a6b576&gt;] slab_post_alloc_hook+0x96/0x490 mm/slab.h:522
    [&lt;ffffffff81a716d3&gt;] slab_alloc_node mm/slub.c:3206 [inline]
    [&lt;ffffffff81a716d3&gt;] slab_alloc mm/slub.c:3214 [inline]
    [&lt;ffffffff81a716d3&gt;] kmem_cache_alloc_trace+0x163/0x370 mm/slub.c:3231
    [&lt;ffffffff82e8681a&gt;] kmalloc include/linux/slab.h:591 [inline]
    [&lt;ffffffff82e8681a&gt;] kzalloc include/linux/slab.h:721 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_group_create drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:4918 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_new drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5054 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_event+0x59a/0x2910 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5239
    [&lt;ffffffff813ef67d&gt;] notifier_call_chain+0xbd/0x210 kernel/notifier.c:83
    [&lt;ffffffff813f0662&gt;] blocking_notifier_call_chain kernel/notifier.c:318 [inline]
    [&lt;ffffffff813f0662&gt;] blocking_notifier_call_chain+0x72/0xa0 kernel/notifier.c:306
    [&lt;ffffffff8384b9c6&gt;] call_nexthop_notifiers+0x156/0x310 net/ipv4/nexthop.c:244
    [&lt;ffffffff83852bd8&gt;] insert_nexthop net/ipv4/nexthop.c:2336 [inline]
    [&lt;ffffffff83852bd8&gt;] nexthop_add net/ipv4/nexthop.c:2644 [inline]
    [&lt;ffffffff83852bd8&gt;] rtm_new_nexthop+0x14e8/0x4d10 net/ipv4/nexthop.c:2913
    [&lt;ffffffff833e9a78&gt;] rtnetlink_rcv_msg+0x448/0xbf0 net/core/rtnetlink.c:5572
    [&lt;ffffffff83608703&gt;] netlink_rcv_skb+0x173/0x480 net/netlink/af_netlink.c:2504
    [&lt;ffffffff833de032&gt;] rtnetlink_rcv+0x22/0x30 net/core/rtnetlink.c:5590
    [&lt;ffffffff836069de&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
    [&lt;ffffffff836069de&gt;] netlink_unicast+0x5ae/0x7f0 net/netlink/af_netlink.c:1340
    [&lt;ffffffff83607501&gt;] netlink_sendmsg+0x8e1/0xe30 net/netlink/af_netlink.c:1929
    [&lt;ffffffff832fde84&gt;] sock_sendmsg_nosec net/socket.c:704 [inline
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47372</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47372" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macb: fix use after free on rmmod

plat_dev-&gt;dev-&gt;platform_data is released by platform_device_unregister(),
use of pclk and hclk is a use-after-free. Since device unregister won't
need a clk device we adjust the function call sequence to fix this issue.

[   31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]
[   31.275563] Freed by task 306:
[   30.276782]  platform_device_release+0x25/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229946">SUSE bug 1229946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47373</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Fix potential VPE leak on error

In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,
there is an off-by-one in the number of VPEs to be freed.

Fix it by simply passing the number of VPEs allocated, which is the
index of the loop iterating over the VPEs.

[maz: fixed commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47374</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47374" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-debug: prevent an error message from causing runtime problems

For some drivers, that use the DMA API. This error message can be reached
several millions of times per second, causing spam to the kernel's printk
buffer and bringing the CPU usage up to 100% (so, it should be rate
limited). However, since there is at least one driver that is in the
mainline and suffers from the error condition, it is more useful to
err_printk() here instead of just rate limiting the error message (in hopes
that it will make it easier for other drivers that suffer from this issue
to be spotted).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47375</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47375" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blktrace: Fix uaf in blk_trace access after removing by sysfs

There is an use-after-free problem triggered by following process:

      P1(sda)				P2(sdb)
			echo 0 &gt; /sys/block/sdb/trace/enable
			  blk_trace_remove_queue
			    synchronize_rcu
			    blk_trace_free
			      relay_close
rcu_read_lock
__blk_add_trace
  trace_note_tsk
  (Iterate running_trace_list)
			        relay_close_buf
				  relay_destroy_buf
				    kfree(buf)
    trace_note(sdb's bt)
      relay_reserve
        buf-&gt;offset &lt;- nullptr deference (use-after-free) !!!
rcu_read_unlock

[  502.714379] BUG: kernel NULL pointer dereference, address:
0000000000000010
[  502.715260] #PF: supervisor read access in kernel mode
[  502.715903] #PF: error_code(0x0000) - not-present page
[  502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0
[  502.717252] Oops: 0000 [#1] SMP
[  502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360
[  502.732872] Call Trace:
[  502.733193]  __blk_add_trace.cold+0x137/0x1a3
[  502.733734]  blk_add_trace_rq+0x7b/0xd0
[  502.734207]  blk_add_trace_rq_issue+0x54/0xa0
[  502.734755]  blk_mq_start_request+0xde/0x1b0
[  502.735287]  scsi_queue_rq+0x528/0x1140
...
[  502.742704]  sg_new_write.isra.0+0x16e/0x3e0
[  502.747501]  sg_ioctl+0x466/0x1100

Reproduce method:
  ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])
  ioctl(/dev/sda, BLKTRACESTART)
  ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])
  ioctl(/dev/sdb, BLKTRACESTART)

  echo 0 &gt; /sys/block/sdb/trace/enable &amp;
  // Add delay(mdelay/msleep) before kernel enters blk_trace_free()

  ioctl$SG_IO(/dev/sda, SG_IO, ...)
  // Enters trace_note_tsk() after blk_trace_free() returned
  // Use mdelay in rcu region rather than msleep(which may schedule out)

Remove blk_trace from running_list before calling blk_trace_free() by
sysfs if blk_trace is at Blktrace_running state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225194">SUSE bug 1225194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47376</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47376" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add oversize check before call kvcalloc()

Commit 7661809d493b ("mm: don't allow oversized kvmalloc() calls") add the
oversize check. When the allocation is larger than what kmalloc() supports,
the following warning triggered:

WARNING: CPU: 0 PID: 8408 at mm/util.c:597 kvmalloc_node+0x108/0x110 mm/util.c:597
Modules linked in:
CPU: 0 PID: 8408 Comm: syz-executor221 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:kvmalloc_node+0x108/0x110 mm/util.c:597
Call Trace:
 kvmalloc include/linux/mm.h:806 [inline]
 kvmalloc_array include/linux/mm.h:824 [inline]
 kvcalloc include/linux/mm.h:829 [inline]
 check_btf_line kernel/bpf/verifier.c:9925 [inline]
 check_btf_info kernel/bpf/verifier.c:10049 [inline]
 bpf_check+0xd634/0x150d0 kernel/bpf/verifier.c:13759
 bpf_prog_load kernel/bpf/syscall.c:2301 [inline]
 __sys_bpf+0x11181/0x126e0 kernel/bpf/syscall.c:4587
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47378</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: destroy cm id before destroy qp to avoid use after free

We should always destroy cm_id before destroy qp to avoid to get cma
event after qp was destroyed, which may lead to use after free.
In RDMA connection establishment error flow, don't destroy qp in cm
event handler.Just report cm_error to upper level, qp will be destroy
in nvme_rdma_alloc_queue() after destroy cm id.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225202">SUSE bug 1225202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47379</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47379" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd

KASAN reports a use-after-free report when doing fuzz test:

[693354.104835] ==================================================================
[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160
[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338

[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147
[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018
[693354.105612] Call Trace:
[693354.105621]  dump_stack+0xf1/0x19b
[693354.105626]  ? show_regs_print_info+0x5/0x5
[693354.105634]  ? printk+0x9c/0xc3
[693354.105638]  ? cpumask_weight+0x1f/0x1f
[693354.105648]  print_address_description+0x70/0x360
[693354.105654]  kasan_report+0x1b2/0x330
[693354.105659]  ? bfq_io_set_weight_legacy+0xd3/0x160
[693354.105665]  ? bfq_io_set_weight_legacy+0xd3/0x160
[693354.105670]  bfq_io_set_weight_legacy+0xd3/0x160
[693354.105675]  ? bfq_cpd_init+0x20/0x20
[693354.105683]  cgroup_file_write+0x3aa/0x510
[693354.105693]  ? ___slab_alloc+0x507/0x540
[693354.105698]  ? cgroup_file_poll+0x60/0x60
[693354.105702]  ? 0xffffffff89600000
[693354.105708]  ? usercopy_abort+0x90/0x90
[693354.105716]  ? mutex_lock+0xef/0x180
[693354.105726]  kernfs_fop_write+0x1ab/0x280
[693354.105732]  ? cgroup_file_poll+0x60/0x60
[693354.105738]  vfs_write+0xe7/0x230
[693354.105744]  ksys_write+0xb0/0x140
[693354.105749]  ? __ia32_sys_read+0x50/0x50
[693354.105760]  do_syscall_64+0x112/0x370
[693354.105766]  ? syscall_return_slowpath+0x260/0x260
[693354.105772]  ? do_page_fault+0x9b/0x270
[693354.105779]  ? prepare_exit_to_usermode+0xf9/0x1a0
[693354.105784]  ? enter_from_user_mode+0x30/0x30
[693354.105793]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.105875] Allocated by task 1453337:
[693354.106001]  kasan_kmalloc+0xa0/0xd0
[693354.106006]  kmem_cache_alloc_node_trace+0x108/0x220
[693354.106010]  bfq_pd_alloc+0x96/0x120
[693354.106015]  blkcg_activate_policy+0x1b7/0x2b0
[693354.106020]  bfq_create_group_hierarchy+0x1e/0x80
[693354.106026]  bfq_init_queue+0x678/0x8c0
[693354.106031]  blk_mq_init_sched+0x1f8/0x460
[693354.106037]  elevator_switch_mq+0xe1/0x240
[693354.106041]  elevator_switch+0x25/0x40
[693354.106045]  elv_iosched_store+0x1a1/0x230
[693354.106049]  queue_attr_store+0x78/0xb0
[693354.106053]  kernfs_fop_write+0x1ab/0x280
[693354.106056]  vfs_write+0xe7/0x230
[693354.106060]  ksys_write+0xb0/0x140
[693354.106064]  do_syscall_64+0x112/0x370
[693354.106069]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.106114] Freed by task 1453336:
[693354.106225]  __kasan_slab_free+0x130/0x180
[693354.106229]  kfree+0x90/0x1b0
[693354.106233]  blkcg_deactivate_policy+0x12c/0x220
[693354.106238]  bfq_exit_queue+0xf5/0x110
[693354.106241]  blk_mq_exit_sched+0x104/0x130
[693354.106245]  __elevator_exit+0x45/0x60
[693354.106249]  elevator_switch_mq+0xd6/0x240
[693354.106253]  elevator_switch+0x25/0x40
[693354.106257]  elv_iosched_store+0x1a1/0x230
[693354.106261]  queue_attr_store+0x78/0xb0
[693354.106264]  kernfs_fop_write+0x1ab/0x280
[693354.106268]  vfs_write+0xe7/0x230
[693354.106271]  ksys_write+0xb0/0x140
[693354.106275]  do_syscall_64+0x112/0x370
[693354.106280]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.106329] The buggy address belongs to the object at ffff888be0a35580
                 which belongs to the cache kmalloc-1k of size 1024
[693354.106736] The buggy address is located 228 bytes inside of
                 1024-byte region [ffff888be0a35580, ffff888be0a35980)
[693354.107114] The buggy address belongs to the page:
[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0
[693354.107606] flags: 0x17ffffc0008100(slab|head)
[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080
[693354.108020] r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225204">SUSE bug 1225204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47380</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47380" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Fix potential NULL pointer dereference

devm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at
registration that will cause NULL pointer dereference since
corresponding data is not initialized yet. The patch moves
initialization of data before devm_add_action_or_reset().

Found by Linux Driver Verification project (linuxtesting.org).

[jkosina@suse.cz: rebase]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47381</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47381" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Fix DSP oops stack dump output contents

Fix @buf arg given to hex_dump_to_buffer() and stack address used
in dump error output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47382</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47382" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix deadlock during failing recovery

Commit 0b9902c1fcc5 ("s390/qeth: fix deadlock during recovery") removed
taking discipline_mutex inside qeth_do_reset(), fixing potential
deadlocks. An error path was missed though, that still takes
discipline_mutex and thus has the original deadlock potential.

Intermittent deadlocks were seen when a qeth channel path is configured
offline, causing a race between qeth_do_reset and ccwgroup_remove.
Call qeth_set_offline() directly in the qeth_do_reset() error case and
then a new variant of ccwgroup_set_offline(), without taking
discipline_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47383</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: Fix out-of-bound vmalloc access in imageblit

This issue happens when a userspace program does an ioctl
FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct
containing only the fields xres, yres, and bits_per_pixel
with values.

If this struct is the same as the previous ioctl, the
vc_resize() detects it and doesn't call the resize_screen(),
leaving the fb_var_screeninfo incomplete. And this leads to
the updatescrollmode() calculates a wrong value to
fbcon_display-&gt;vrows, which makes the real_y() return a
wrong value of y, and that value, eventually, causes
the imageblit to access an out-of-bound address value.

To solve this issue I made the resize_screen() be called
even if the screen does not need any resizing, so it will
"fix and fill" the fb_var_screeninfo independently.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225211">SUSE bug 1225211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47384</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47384" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field

If driver read tmp value sufficient for
(tmp &amp; 0x08) &amp;&amp; (!(tmp &amp; 0x80)) &amp;&amp; ((tmp &amp; 0x7) == ((tmp &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47385</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47385" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47386</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47386" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47387</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47387" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: schedutil: Use kobject release() method to free sugov_tunables

The struct sugov_tunables is protected by the kobject, so we can't free
it directly. Otherwise we would get a call trace like this:
  ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x30
  WARNING: CPU: 3 PID: 720 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100
  Modules linked in:
  CPU: 3 PID: 720 Comm: a.sh Tainted: G        W         5.14.0-rc1-next-20210715-yocto-standard+ #507
  Hardware name: Marvell OcteonTX CN96XX board (DT)
  pstate: 40400009 (nZcv daif +PAN -UAO -TCO BTYPE=--)
  pc : debug_print_object+0xb8/0x100
  lr : debug_print_object+0xb8/0x100
  sp : ffff80001ecaf910
  x29: ffff80001ecaf910 x28: ffff00011b10b8d0 x27: ffff800011043d80
  x26: ffff00011a8f0000 x25: ffff800013cb3ff0 x24: 0000000000000000
  x23: ffff80001142aa68 x22: ffff800011043d80 x21: ffff00010de46f20
  x20: ffff800013c0c520 x19: ffff800011d8f5b0 x18: 0000000000000010
  x17: 6e6968207473696c x16: 5f72656d6974203a x15: 6570797420746365
  x14: 6a626f2029302065 x13: 303378302f307830 x12: 2b6e665f72656d69
  x11: ffff8000124b1560 x10: ffff800012331520 x9 : ffff8000100ca6b0
  x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 0000000000000001
  x5 : ffff800011d8c000 x4 : ffff800011d8c740 x3 : 0000000000000000
  x2 : ffff0001108301c0 x1 : ab3c90eedf9c0f00 x0 : 0000000000000000
  Call trace:
   debug_print_object+0xb8/0x100
   __debug_check_no_obj_freed+0x1c0/0x230
   debug_check_no_obj_freed+0x20/0x88
   slab_free_freelist_hook+0x154/0x1c8
   kfree+0x114/0x5d0
   sugov_exit+0xbc/0xc0
   cpufreq_exit_governor+0x44/0x90
   cpufreq_set_policy+0x268/0x4a8
   store_scaling_governor+0xe0/0x128
   store+0xc0/0xf0
   sysfs_kf_write+0x54/0x80
   kernfs_fop_write_iter+0x128/0x1c0
   new_sync_write+0xf0/0x190
   vfs_write+0x2d4/0x478
   ksys_write+0x74/0x100
   __arm64_sys_write+0x24/0x30
   invoke_syscall.constprop.0+0x54/0xe0
   do_el0_svc+0x64/0x158
   el0_svc+0x2c/0xb0
   el0t_64_sync_handler+0xb0/0xb8
   el0t_64_sync+0x198/0x19c
  irq event stamp: 5518
  hardirqs last  enabled at (5517): [&lt;ffff8000100cbd7c&gt;] console_unlock+0x554/0x6c8
  hardirqs last disabled at (5518): [&lt;ffff800010fc0638&gt;] el1_dbg+0x28/0xa0
  softirqs last  enabled at (5504): [&lt;ffff8000100106e0&gt;] __do_softirq+0x4d0/0x6c0
  softirqs last disabled at (5483): [&lt;ffff800010049548&gt;] irq_exit+0x1b0/0x1b8

So split the original sugov_tunables_free() into two functions,
sugov_clear_global_tunables() is just used to clear the global_tunables
and the new sugov_tunables_free() is used as kobj_type::release to
release the sugov_tunables safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47388</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix use-after-free in CCMP/GCMP RX

When PN checking is done in mac80211, for fragmentation we need
to copy the PN to the RX struct so we can later use it to do a
comparison, since commit bf30ca922a0c ("mac80211: check defrag
PN against current frame").

Unfortunately, in that commit I used the 'hdr' variable without
it being necessarily valid, so use-after-free could occur if it
was necessary to reallocate (parts of) the frame.

Fix this by reloading the variable after the code that results
in the reallocations, if any.

This fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47389" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: fix missing sev_decommission in sev_receive_start

DECOMMISSION the current SEV context if binding an ASID fails after
RECEIVE_START.  Per AMD's SEV API, RECEIVE_START generates a new guest
context and thus needs to be paired with DECOMMISSION:

     The RECEIVE_START command is the only command other than the LAUNCH_START
     command that generates a new guest context and guest handle.

The missing DECOMMISSION can result in subsequent SEV launch failures,
as the firmware leaks memory and might not able to allocate more SEV
guest contexts in the future.

Note, LAUNCH_START suffered the same bug, but was previously fixed by
commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID
binding fails").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47390</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47390" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()

KASAN reports the following issue:

 BUG: KASAN: stack-out-of-bounds in kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
 Read of size 8 at addr ffffc9001364f638 by task qemu-kvm/4798

 CPU: 0 PID: 4798 Comm: qemu-kvm Tainted: G               X --------- ---
 Hardware name: AMD Corporation DAYTONA_X/DAYTONA_X, BIOS RYM0081C 07/13/2020
 Call Trace:
  dump_stack+0xa5/0xe6
  print_address_description.constprop.0+0x18/0x130
  ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  __kasan_report.cold+0x7f/0x114
  ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  kasan_report+0x38/0x50
  kasan_check_range+0xf5/0x1d0
  kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  kvm_make_scan_ioapic_request_mask+0x84/0xc0 [kvm]
  ? kvm_arch_exit+0x110/0x110 [kvm]
  ? sched_clock+0x5/0x10
  ioapic_write_indirect+0x59f/0x9e0 [kvm]
  ? static_obj+0xc0/0xc0
  ? __lock_acquired+0x1d2/0x8c0
  ? kvm_ioapic_eoi_inject_work+0x120/0x120 [kvm]

The problem appears to be that 'vcpu_bitmap' is allocated as a single long
on stack and it should really be KVM_MAX_VCPUS long. We also seem to clear
the lower 16 bits of it with bitmap_zero() for no particular reason (my
guess would be that 'bitmap' and 'vcpu_bitmap' variables in
kvm_bitmap_or_dest_vcpus() caused the confusion: while the later is indeed
16-bit long, the later should accommodate all possible vCPUs).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47391</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47391" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests

The FSM can run in a circle allowing rdma_resolve_ip() to be called twice
on the same id_priv. While this cannot happen without going through the
work, it violates the invariant that the same address resolution
background request cannot be active twice.

       CPU 1                                  CPU 2

rdma_resolve_addr():
  RDMA_CM_IDLE -&gt; RDMA_CM_ADDR_QUERY
  rdma_resolve_ip(addr_handler)  #1

			 process_one_req(): for #1
                          addr_handler():
                            RDMA_CM_ADDR_QUERY -&gt; RDMA_CM_ADDR_BOUND
                            mutex_unlock(&amp;id_priv-&gt;handler_mutex);
                            [.. handler still running ..]

rdma_resolve_addr():
  RDMA_CM_ADDR_BOUND -&gt; RDMA_CM_ADDR_QUERY
  rdma_resolve_ip(addr_handler)
    !! two requests are now on the req_list

rdma_destroy_id():
 destroy_id_handler_unlock():
  _destroy_id():
   cma_cancel_operation():
    rdma_addr_cancel()

                          // process_one_req() self removes it
		          spin_lock_bh(&amp;lock);
                           cancel_delayed_work(&amp;req-&gt;work);
	                   if (!list_empty(&amp;req-&gt;list)) == true

      ! rdma_addr_cancel() returns after process_on_req #1 is done

   kfree(id_priv)

			 process_one_req(): for #2
                          addr_handler():
	                    mutex_lock(&amp;id_priv-&gt;handler_mutex);
                            !! Use after free on id_priv

rdma_addr_cancel() expects there to be one req on the list and only
cancels the first one. The self-removal behavior of the work only happens
after the handler has returned. This yields a situations where the
req_list can have two reqs for the same "handle" but rdma_addr_cancel()
only cancels the first one.

The second req remains active beyond rdma_destroy_id() and will
use-after-free id_priv once it inevitably triggers.

Fix this by remembering if the id_priv has called rdma_resolve_ip() and
always cancel before calling it again. This ensures the req_list never
gets more than one item in it and doesn't cost anything in the normal flow
that never uses this strange error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225319">SUSE bug 1225319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47392</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47392" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure

If cma_listen_on_all() fails it leaves the per-device ID still on the
listen_list but the state is not set to RDMA_CM_ADDR_BOUND.

When the cmid is eventually destroyed cma_cancel_listens() is not called
due to the wrong state, however the per-device IDs are still holding the
refcount preventing the ID from being destroyed, thus deadlocking:

 task:rping state:D stack:   0 pid:19605 ppid: 47036 flags:0x00000084
 Call Trace:
  __schedule+0x29a/0x780
  ? free_unref_page_commit+0x9b/0x110
  schedule+0x3c/0xa0
  schedule_timeout+0x215/0x2b0
  ? __flush_work+0x19e/0x1e0
  wait_for_completion+0x8d/0xf0
  _destroy_id+0x144/0x210 [rdma_cm]
  ucma_close_id+0x2b/0x40 [rdma_ucm]
  __destroy_id+0x93/0x2c0 [rdma_ucm]
  ? __xa_erase+0x4a/0xa0
  ucma_destroy_id+0x9a/0x120 [rdma_ucm]
  ucma_write+0xb8/0x130 [rdma_ucm]
  vfs_write+0xb4/0x250
  ksys_write+0xb5/0xd0
  ? syscall_trace_enter.isra.19+0x123/0x190
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xa9

Ensure that cma_listen_on_all() atomically unwinds its action under the
lock during error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47393</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47393" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs

Fan speed minimum can be enforced from sysfs. For example, setting
current fan speed to 20 is used to enforce fan speed to be at 100%
speed, 19 - to be not below 90% speed, etcetera. This feature provides
ability to limit fan speed according to some system wise
considerations, like absence of some replaceable units or high system
ambient temperature.

Request for changing fan minimum speed is configuration request and can
be set only through 'sysfs' write procedure. In this situation value of
argument 'state' is above nominal fan speed maximum.

Return non-zero code in this case to avoid
thermal_cooling_device_stats_update() call, because in this case
statistics update violates thermal statistics table range.
The issues is observed in case kernel is configured with option
CONFIG_THERMAL_STATISTICS.

Here is the trace from KASAN:
[  159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0
[  159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444
[  159.545625] Call Trace:
[  159.548366]  dump_stack+0x92/0xc1
[  159.552084]  ? thermal_cooling_device_stats_update+0x7d/0xb0
[  159.635869]  thermal_zone_device_update+0x345/0x780
[  159.688711]  thermal_zone_device_set_mode+0x7d/0xc0
[  159.694174]  mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]
[  159.700972]  ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]
[  159.731827]  mlxsw_thermal_init+0x763/0x880 [mlxsw_core]
[  160.070233] RIP: 0033:0x7fd995909970
[  160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ..
[  160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970
[  160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001
[  160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700
[  160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013
[  160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013
[  160.143671]
[  160.145338] Allocated by task 2924:
[  160.149242]  kasan_save_stack+0x19/0x40
[  160.153541]  __kasan_kmalloc+0x7f/0xa0
[  160.157743]  __kmalloc+0x1a2/0x2b0
[  160.161552]  thermal_cooling_device_setup_sysfs+0xf9/0x1a0
[  160.167687]  __thermal_cooling_device_register+0x1b5/0x500
[  160.173833]  devm_thermal_of_cooling_device_register+0x60/0xa0
[  160.180356]  mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]
[  160.248140]
[  160.249807] The buggy address belongs to the object at ffff888116163400
[  160.249807]  which belongs to the cache kmalloc-1k of size 1024
[  160.263814] The buggy address is located 64 bytes to the right of
[  160.263814]  1024-byte region [ffff888116163400, ffff888116163800)
[  160.277536] The buggy address belongs to the page:
[  160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160
[  160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0
[  160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)
[  160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0
[  160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000
[  160.327033] page dumped because: kasan: bad access detected
[  160.333270]
[  160.334937] Memory state around the buggy address:
[  160.356469] &gt;ffff888116163800: fc ..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47394" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unlink table before deleting it

syzbot reports following UAF:
BUG: KASAN: use-after-free in memcmp+0x18f/0x1c0 lib/string.c:955
 nla_strcmp+0xf2/0x130 lib/nlattr.c:836
 nft_table_lookup.part.0+0x1a2/0x460 net/netfilter/nf_tables_api.c:570
 nft_table_lookup net/netfilter/nf_tables_api.c:4064 [inline]
 nf_tables_getset+0x1b3/0x860 net/netfilter/nf_tables_api.c:4064
 nfnetlink_rcv_msg+0x659/0x13f0 net/netfilter/nfnetlink.c:285
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504

Problem is that all get operations are lockless, so the commit_mutex
held by nft_rcv_nl_event() isn't enough to stop a parallel GET request
from doing read-accesses to the table object even after synchronize_rcu().

To avoid this, unlink the table first and store the table objects in
on-stack scratch space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227906">SUSE bug 1227906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47395</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap

Limit max values for vht mcs and nss in ieee80211_parse_tx_radiotap
routine in order to fix the following warning reported by syzbot:

WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
Modules linked in:
CPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
RIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
RSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216
RAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000
RDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100
R10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8
R13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004
FS:  00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740
 netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089
 __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165
 __bpf_tx_skb net/core/filter.c:2114 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2139 [inline]
 __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162
 ____bpf_clone_redirect net/core/filter.c:2429 [inline]
 bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401
 bpf_prog_eeb6f53a69e5c6a2+0x59/0x234
 bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]
 __bpf_prog_run include/linux/filter.h:624 [inline]
 bpf_prog_run include/linux/filter.h:631 [inline]
 bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119
 bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663
 bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]
 __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47396</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47396" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211-hwsim: fix late beacon hrtimer handling

Thomas explained in https://lore.kernel.org/r/87mtoeb4hb.ffs@tglx
that our handling of the hrtimer here is wrong: If the timer fires
late (e.g. due to vCPU scheduling, as reported by Dmitry/syzbot)
then it tries to actually rearm the timer at the next deadline,
which might be in the past already:

 1          2          3          N          N+1
 |          |          |   ...    |          |

 ^ intended to fire here (1)
            ^ next deadline here (2)
                                      ^ actually fired here

The next time it fires, it's later, but will still try to schedule
for the next deadline (now 3), etc. until it catches up with N,
but that might take a long time, causing stalls etc.

Now, all of this is simulation, so we just have to fix it, but
note that the behaviour is wrong even per spec, since there's no
value then in sending all those beacons unaligned - they should be
aligned to the TBTT (1, 2, 3, ... in the picture), and if we're a
bit (or a lot) late, then just resume at that point.

Therefore, change the code to use hrtimer_forward_now() which will
ensure that the next firing of the timer would be at N+1 (in the
picture), i.e. the next interval point after the current time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47397</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47397" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb

We should always check if skb_header_pointer's return is NULL before
using it, otherwise it may cause null-ptr-deref, as syzbot reported:

  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]
  RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196
  Call Trace:
  &lt;IRQ&gt;
   sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109
   ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422
   ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463
   NF_HOOK include/linux/netfilter.h:307 [inline]
   NF_HOOK include/linux/netfilter.h:301 [inline]
   ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472
   dst_input include/net/dst.h:460 [inline]
   ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]
   NF_HOOK include/linux/netfilter.h:307 [inline]
   NF_HOOK include/linux/netfilter.h:301 [inline]
   ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47398</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47398" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hfi1: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long long' and printed with %llx.  Change %llx to %p to print the secured
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47399</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup

The ixgbe driver currently generates a NULL pointer dereference with
some machine (online cpus &lt; 63). This is due to the fact that the
maximum value of num_xdp_queues is nr_cpu_ids. Code is in
"ixgbe_set_rss_queues"".

Here's how the problem repeats itself:
Some machine (online cpus &lt; 63), And user set num_queues to 63 through
ethtool. Code is in the "ixgbe_set_channels",
	adapter-&gt;ring_feature[RING_F_FDIR].limit = count;

It becomes 63.

When user use xdp, "ixgbe_set_rss_queues" will set queues num.
	adapter-&gt;num_rx_queues = rss_i;
	adapter-&gt;num_tx_queues = rss_i;
	adapter-&gt;num_xdp_queues = ixgbe_xdp_queues(adapter);

And rss_i's value is from
	f = &amp;adapter-&gt;ring_feature[RING_F_FDIR];
	rss_i = f-&gt;indices = f-&gt;limit;

So "num_rx_queues" &gt; "num_xdp_queues", when run to "ixgbe_xdp_setup",
	for (i = 0; i &lt; adapter-&gt;num_rx_queues; i++)
		if (adapter-&gt;xdp_ring[i]-&gt;xsk_umem)

It leads to panic.

Call trace:
[exception RIP: ixgbe_xdp+368]
RIP: ffffffffc02a76a0  RSP: ffff9fe16202f8d0  RFLAGS: 00010297
RAX: 0000000000000000  RBX: 0000000000000020  RCX: 0000000000000000
RDX: 0000000000000000  RSI: 000000000000001c  RDI: ffffffffa94ead90
RBP: ffff92f8f24c0c18   R8: 0000000000000000   R9: 0000000000000000
R10: ffff9fe16202f830  R11: 0000000000000000  R12: ffff92f8f24c0000
R13: ffff9fe16202fc01  R14: 000000000000000a  R15: ffffffffc02a7530
ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc
 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808
 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235
10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384
11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd
12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb
13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88
14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319
15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290
16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8
17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64
18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9
19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c

So I fix ixgbe_max_channels so that it will not allow a setting of queues
to be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,
take the smaller value of num_rx_queues and num_xdp_queues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47400</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: do not allow call hns3_nic_net_open repeatedly

hns3_nic_net_open() is not allowed to called repeatly, but there
is no checking for this. When doing device reset and setup tc
concurrently, there is a small oppotunity to call hns3_nic_net_open
repeatedly, and cause kernel bug by calling napi_enable twice.

The calltrace information is like below:
[ 3078.222780] ------------[ cut here ]------------
[ 3078.230255] kernel BUG at net/core/dev.c:6991!
[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)
[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G           O      5.14.0-rc4+ #1
[ 3078.269102] Hardware name:  , BIOS KpxxxFPGA 1P B600 V181 08/12/2021
[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]
[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)
[ 3078.296168] pc : napi_enable+0x80/0x84
tc qdisc sho[w  3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]

[ 3078.314771] sp : ffff8000108abb20
[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300
[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000
[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880
[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000
[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930
[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4
[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8
[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344
[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938
[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0
[ 3078.414657] Call trace:
[ 3078.418517]  napi_enable+0x80/0x84
[ 3078.424626]  hns3_reset_notify_up_enet+0x78/0xd0 [hns3]
[ 3078.433469]  hns3_reset_notify+0x64/0x80 [hns3]
[ 3078.441430]  hclge_notify_client+0x68/0xb0 [hclge]
[ 3078.450511]  hclge_reset_rebuild+0x524/0x884 [hclge]
[ 3078.458879]  hclge_reset_service_task+0x3c4/0x680 [hclge]
[ 3078.467470]  hclge_service_task+0xb0/0xb54 [hclge]
[ 3078.475675]  process_one_work+0x1dc/0x48c
[ 3078.481888]  worker_thread+0x15c/0x464
[ 3078.487104]  kthread+0x160/0x170
[ 3078.492479]  ret_from_fork+0x10/0x18
[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)
[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---

Once hns3_nic_net_open() is excute success, the flag
HNS3_NIC_STATE_DOWN will be cleared. So add checking for this
flag, directly return when HNS3_NIC_STATE_DOWN is no set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47401</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix stack information leak

The tty driver name is used also after registering the driver and must
specifically not be allocated on the stack to avoid leaking information
to user space (or triggering an oops).

Drivers should not try to encode topology information in the tty device
name but this one snuck in through staging without anyone noticing and
another driver has since copied this malpractice.

Fixing the ABI is a separate issue, but this at least plugs the security
hole.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47402</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: flower: protect fl_walk() with rcu

Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul()
also removed rcu protection of individual filters which causes following
use-after-free when filter is deleted concurrently. Fix fl_walk() to obtain
rcu read lock while iterating and taking the filter reference and temporary
release the lock while calling arg-&gt;fn() callback that can sleep.

KASAN trace:

[  352.773640] ==================================================================
[  352.775041] BUG: KASAN: use-after-free in fl_walk+0x159/0x240 [cls_flower]
[  352.776304] Read of size 4 at addr ffff8881c8251480 by task tc/2987

[  352.777862] CPU: 3 PID: 2987 Comm: tc Not tainted 5.15.0-rc2+ #2
[  352.778980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  352.781022] Call Trace:
[  352.781573]  dump_stack_lvl+0x46/0x5a
[  352.782332]  print_address_description.constprop.0+0x1f/0x140
[  352.783400]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.784292]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.785138]  kasan_report.cold+0x83/0xdf
[  352.785851]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.786587]  kasan_check_range+0x145/0x1a0
[  352.787337]  fl_walk+0x159/0x240 [cls_flower]
[  352.788163]  ? fl_put+0x10/0x10 [cls_flower]
[  352.789007]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.790102]  tcf_chain_dump+0x231/0x450
[  352.790878]  ? tcf_chain_tp_delete_empty+0x170/0x170
[  352.791833]  ? __might_sleep+0x2e/0xc0
[  352.792594]  ? tfilter_notify+0x170/0x170
[  352.793400]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.794477]  tc_dump_tfilter+0x385/0x4b0
[  352.795262]  ? tc_new_tfilter+0x1180/0x1180
[  352.796103]  ? __mod_node_page_state+0x1f/0xc0
[  352.796974]  ? __build_skb_around+0x10e/0x130
[  352.797826]  netlink_dump+0x2c0/0x560
[  352.798563]  ? netlink_getsockopt+0x430/0x430
[  352.799433]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.800542]  __netlink_dump_start+0x356/0x440
[  352.801397]  rtnetlink_rcv_msg+0x3ff/0x550
[  352.802190]  ? tc_new_tfilter+0x1180/0x1180
[  352.802872]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  352.803668]  ? tc_new_tfilter+0x1180/0x1180
[  352.804344]  ? _copy_from_iter_nocache+0x800/0x800
[  352.805202]  ? kasan_set_track+0x1c/0x30
[  352.805900]  netlink_rcv_skb+0xc6/0x1f0
[  352.806587]  ? rht_deferred_worker+0x6b0/0x6b0
[  352.807455]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  352.808324]  ? netlink_ack+0x4d0/0x4d0
[  352.809086]  ? netlink_deliver_tap+0x62/0x3d0
[  352.809951]  netlink_unicast+0x353/0x480
[  352.810744]  ? netlink_attachskb+0x430/0x430
[  352.811586]  ? __alloc_skb+0xd7/0x200
[  352.812349]  netlink_sendmsg+0x396/0x680
[  352.813132]  ? netlink_unicast+0x480/0x480
[  352.813952]  ? __import_iovec+0x192/0x210
[  352.814759]  ? netlink_unicast+0x480/0x480
[  352.815580]  sock_sendmsg+0x6c/0x80
[  352.816299]  ____sys_sendmsg+0x3a5/0x3c0
[  352.817096]  ? kernel_sendmsg+0x30/0x30
[  352.817873]  ? __ia32_sys_recvmmsg+0x150/0x150
[  352.818753]  ___sys_sendmsg+0xd8/0x140
[  352.819518]  ? sendmsg_copy_msghdr+0x110/0x110
[  352.820402]  ? ___sys_recvmsg+0xf4/0x1a0
[  352.821110]  ? __copy_msghdr_from_user+0x260/0x260
[  352.821934]  ? _raw_spin_lock+0x81/0xd0
[  352.822680]  ? __handle_mm_fault+0xef3/0x1b20
[  352.823549]  ? rb_insert_color+0x2a/0x270
[  352.824373]  ? copy_page_range+0x16b0/0x16b0
[  352.825209]  ? perf_event_update_userpage+0x2d0/0x2d0
[  352.826190]  ? __fget_light+0xd9/0xf0
[  352.826941]  __sys_sendmsg+0xb3/0x130
[  352.827613]  ? __sys_sendmsg_sock+0x20/0x20
[  352.828377]  ? do_user_addr_fault+0x2c5/0x8a0
[  352.829184]  ? fpregs_assert_state_consistent+0x52/0x60
[  352.830001]  ? exit_to_user_mode_prepare+0x32/0x160
[  352.830845]  do_syscall_64+0x35/0x80
[  352.831445]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  352.832331] RIP: 0033:0x7f7bee973c17
[ 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225302">SUSE bug 1225302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47403</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47403" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix module reference leak

A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.

Fix this by taking the module reference and initialising the tty driver
data when installing the tty.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47404</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47404" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: betop: fix slab-out-of-bounds Write in betop_probe

Syzbot reported slab-out-of-bounds Write bug in hid-betopff driver.
The problem is the driver assumes the device must have an input report but
some malicious devices violate this assumption.

So this patch checks hid_device's input is non empty before it's been used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47405</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: free raw_report buffers in usbhid_stop

Free the unsent raw_report buffers when the device is removed.

Fixes a memory leak reported by syzbot at:
https://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47406</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47406" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add error checking to ext4_ext_replay_set_iblocks()

If the call to ext4_map_blocks() fails due to an corrupted file
system, ext4_ext_replay_set_iblocks() can get stuck in an infinite
loop.  This could be reproduced by running generic/526 with a file
system that has inline_data and fast_commit enabled.  The system will
repeatedly log to the console:

EXT4-fs warning (device dm-3): ext4_block_to_path:105: block 1074800922 &gt; max in inode 131076

and the stack that it gets stuck in is:

   ext4_block_to_path+0xe3/0x130
   ext4_ind_map_blocks+0x93/0x690
   ext4_map_blocks+0x100/0x660
   skip_hole+0x47/0x70
   ext4_ext_replay_set_iblocks+0x223/0x440
   ext4_fc_replay_inode+0x29e/0x3b0
   ext4_fc_replay+0x278/0x550
   do_one_pass+0x646/0xc10
   jbd2_journal_recover+0x14a/0x270
   jbd2_journal_load+0xc4/0x150
   ext4_load_journal+0x1f3/0x490
   ext4_fill_super+0x22d4/0x2c00

With this patch, generic/526 still fails, but system is no longer
locking up in a tight loop.  It's likely the root casue is that
fast_commit replay is corrupting file systems with inline_data, and we
probably need to add better error handling in the fast commit replay
code path beyond what is done here, which essentially just breaks the
infinite loop without reporting the to the higher levels of the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47407</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47407" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Handle SRCU initialization failure during page track init

Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism.  Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.

[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47408</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47408" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: serialize hash resizes and cleanups

Syzbot was able to trigger the following warning [1]

No repro found by syzbot yet but I was able to trigger similar issue
by having 2 scripts running in parallel, changing conntrack hash sizes,
and:

for j in `seq 1 1000` ; do unshare -n /bin/true &gt;/dev/null ; done

It would take more than 5 minutes for net_namespace structures
to be cleaned up.

This is because nf_ct_iterate_cleanup() has to restart everytime
a resize happened.

By adding a mutex, we can serialize hash resizes and cleanups
and also make get_next_corpse() faster by skipping over empty
buckets.

Even without resizes in the picture, this patch considerably
speeds up network namespace dismantles.

[1]
INFO: task syz-executor.0:8312 can't die for more than 144 seconds.
task:syz-executor.0  state:R  running task     stack:25672 pid: 8312 ppid:  6573 flags:0x00004006
Call Trace:
 context_switch kernel/sched/core.c:4955 [inline]
 __schedule+0x940/0x26f0 kernel/sched/core.c:6236
 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6408
 preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:35
 __local_bh_enable_ip+0x109/0x120 kernel/softirq.c:390
 local_bh_enable include/linux/bottom_half.h:32 [inline]
 get_next_corpse net/netfilter/nf_conntrack_core.c:2252 [inline]
 nf_ct_iterate_cleanup+0x15a/0x450 net/netfilter/nf_conntrack_core.c:2275
 nf_conntrack_cleanup_net_list+0x14c/0x4f0 net/netfilter/nf_conntrack_core.c:2469
 ops_exit_list+0x10d/0x160 net/core/net_namespace.c:171
 setup_net+0x639/0xa30 net/core/net_namespace.c:349
 copy_net_ns+0x319/0x760 net/core/net_namespace.c:470
 create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0xc1/0x1f0 kernel/nsproxy.c:226
 ksys_unshare+0x445/0x920 kernel/fork.c:3128
 __do_sys_unshare kernel/fork.c:3202 [inline]
 __se_sys_unshare kernel/fork.c:3200 [inline]
 __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3200
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f63da68e739
RSP: 002b:00007f63d7c05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f63da792f80 RCX: 00007f63da68e739
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f63da6e8cc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63da792f80
R13: 00007fff50b75d3f R14: 00007f63d7c05300 R15: 0000000000022000

Showing all locks held in the system:
1 lock held by khungtaskd/27:
 #0: ffffffff8b980020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446
2 locks held by kworker/u4:2/153:
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268
 #1: ffffc9000140fdb0 ((kfence_timer).work){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272
1 lock held by systemd-udevd/2970:
1 lock held by in:imklog/6258:
 #0: ffff88807f970ff0 (&amp;f-&gt;f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
3 locks held by kworker/1:6/8158:
1 lock held by syz-executor.0/8312:
2 locks held by kworker/u4:13/9320:
1 lock held by
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47409</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47409" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47410</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47410" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix svm_migrate_fini warning

Device manager releases device-specific resources when a driver
disconnects from a device, devm_memunmap_pages and
devm_release_mem_region calls in svm_migrate_fini are redundant.

It causes below warning trace after patch "drm/amdgpu: Split
amdgpu_device_fini into early and late", so remove function
svm_migrate_fini.

BUG: https://gitlab.freedesktop.org/drm/amd/-/issues/1718

WARNING: CPU: 1 PID: 3646 at drivers/base/devres.c:795
devm_release_action+0x51/0x60
Call Trace:
    ? memunmap_pages+0x360/0x360
    svm_migrate_fini+0x2d/0x60 [amdgpu]
    kgd2kfd_device_exit+0x23/0xa0 [amdgpu]
    amdgpu_amdkfd_device_fini_sw+0x1d/0x30 [amdgpu]
    amdgpu_device_fini_sw+0x45/0x290 [amdgpu]
    amdgpu_driver_release_kms+0x12/0x30 [amdgpu]
    drm_dev_release+0x20/0x40 [drm]
    release_nodes+0x196/0x1e0
    device_release_driver_internal+0x104/0x1d0
    driver_detach+0x47/0x90
    bus_remove_driver+0x7a/0xd0
    pci_unregister_driver+0x3d/0x90
    amdgpu_exit+0x11/0x20 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47412</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47412" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't call rq_qos_ops-&gt;done_bio if the bio isn't tracked

rq_qos framework is only applied on request based driver, so:

1) rq_qos_done_bio() needn't to be called for bio based driver

2) rq_qos_done_bio() needn't to be called for bio which isn't tracked,
such as bios ended from error handling code.

Especially in bio_endio():

1) request queue is referred via bio-&gt;bi_bdev-&gt;bd_disk-&gt;queue, which
may be gone since request queue refcount may not be held in above two
cases

2) q-&gt;rq_qos may be freed in blk_cleanup_queue() when calling into
__rq_qos_done_bio()

Fix the potential kernel panic by not calling rq_qos_ops-&gt;done_bio if
the bio isn't tracked. This way is safe because both ioc_rqos_done_bio()
and blkcg_iolatency_done_bio() are nop if the bio isn't tracked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47413</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47413" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle

When passing 'phys' in the devicetree to describe the USB PHY phandle
(which is the recommended way according to
Documentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the
following NULL pointer dereference is observed on i.MX7 and i.MX8MM:

[    1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098
[    1.498170] Mem abort info:
[    1.500966]   ESR = 0x96000044
[    1.504030]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.509356]   SET = 0, FnV = 0
[    1.512416]   EA = 0, S1PTW = 0
[    1.515569]   FSC = 0x04: level 0 translation fault
[    1.520458] Data abort info:
[    1.523349]   ISV = 0, ISS = 0x00000044
[    1.527196]   CM = 0, WnR = 1
[    1.530176] [0000000000000098] user address but active_mm is swapper
[    1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[    1.542125] Modules linked in:
[    1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3
[    1.551901] Hardware name: Kontron i.MX8MM N801X S (DT)
[    1.557133] Workqueue: events_unbound deferred_probe_work_func
[    1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)
[    1.568998] pc : imx7d_charger_detection+0x3f0/0x510
[    1.573973] lr : imx7d_charger_detection+0x22c/0x510

This happens because the charger functions check for the phy presence
inside the imx_usbmisc_data structure (data-&gt;usb_phy), but the chipidea
core populates the usb_phy passed via 'phys' inside 'struct ci_hdrc'
(ci-&gt;usb_phy) instead.

This causes the NULL pointer dereference inside imx7d_charger_detection().

Fix it by also searching for 'phys' in case 'fsl,usbphy' is not found.

Tested on a imx7s-warp board.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47414</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47414" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Flush current cpu icache before other cpus

On SiFive Unmatched, I recently fell onto the following BUG when booting:

[    0.000000] ftrace: allocating 36610 entries in 144 pages
[    0.000000] Oops - illegal instruction [#1]
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.13.1+ #5
[    0.000000] Hardware name: SiFive HiFive Unmatched A00 (DT)
[    0.000000] epc : riscv_cpuid_to_hartid_mask+0x6/0xae
[    0.000000]  ra : __sbi_rfence_v02+0xc8/0x10a
[    0.000000] epc : ffffffff80007240 ra : ffffffff80009964 sp : ffffffff81803e10
[    0.000000]  gp : ffffffff81a1ea70 tp : ffffffff8180f500 t0 : ffffffe07fe30000
[    0.000000]  t1 : 0000000000000004 t2 : 0000000000000000 s0 : ffffffff81803e60
[    0.000000]  s1 : 0000000000000000 a0 : ffffffff81a22238 a1 : ffffffff81803e10
[    0.000000]  a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
[    0.000000]  a5 : 0000000000000000 a6 : ffffffff8000989c a7 : 0000000052464e43
[    0.000000]  s2 : ffffffff81a220c8 s3 : 0000000000000000 s4 : 0000000000000000
[    0.000000]  s5 : 0000000000000000 s6 : 0000000200000100 s7 : 0000000000000001
[    0.000000]  s8 : ffffffe07fe04040 s9 : ffffffff81a22c80 s10: 0000000000001000
[    0.000000]  s11: 0000000000000004 t3 : 0000000000000001 t4 : 0000000000000008
[    0.000000]  t5 : ffffffcf04000808 t6 : ffffffe3ffddf188
[    0.000000] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000002
[    0.000000] [&lt;ffffffff80007240&gt;] riscv_cpuid_to_hartid_mask+0x6/0xae
[    0.000000] [&lt;ffffffff80009474&gt;] sbi_remote_fence_i+0x1e/0x26
[    0.000000] [&lt;ffffffff8000b8f4&gt;] flush_icache_all+0x12/0x1a
[    0.000000] [&lt;ffffffff8000666c&gt;] patch_text_nosync+0x26/0x32
[    0.000000] [&lt;ffffffff8000884e&gt;] ftrace_init_nop+0x52/0x8c
[    0.000000] [&lt;ffffffff800f051e&gt;] ftrace_process_locs.isra.0+0x29c/0x360
[    0.000000] [&lt;ffffffff80a0e3c6&gt;] ftrace_init+0x80/0x130
[    0.000000] [&lt;ffffffff80a00f8c&gt;] start_kernel+0x5c4/0x8f6
[    0.000000] ---[ end trace f67eb9af4d8d492b ]---
[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

While ftrace is looping over a list of addresses to patch, it always failed
when patching the same function: riscv_cpuid_to_hartid_mask. Looking at the
backtrace, the illegal instruction is encountered in this same function.
However, patch_text_nosync, after patching the instructions, calls
flush_icache_range. But looking at what happens in this function:

flush_icache_range -&gt; flush_icache_all
                   -&gt; sbi_remote_fence_i
                   -&gt; __sbi_rfence_v02
                   -&gt; riscv_cpuid_to_hartid_mask

The icache and dcache of the current cpu are never synchronized between the
patching of riscv_cpuid_to_hartid_mask and calling this same function.

So fix this by flushing the current cpu's icache before asking for the other
cpus to do the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47415</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47415" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mvm: Fix possible NULL dereference

In __iwl_mvm_remove_time_event() check that 'te_data-&gt;vif' is NULL
before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47416</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: mdio: fix memory leak

Syzbot reported memory leak in MDIO bus interface, the problem was in
wrong state logic.

MDIOBUS_ALLOCATED indicates 2 states:
	1. Bus is only allocated
	2. Bus allocated and __mdiobus_register() fails, but
	   device_register() was called

In case of device_register() has been called we should call put_device()
to correctly free the memory allocated for this device, but mdiobus_free()
calls just kfree(dev) in case of MDIOBUS_ALLOCATED state

To avoid this behaviour we need to set bus-&gt;state to MDIOBUS_UNREGISTERED
_before_ calling device_register(), because put_device() should be
called even in case of device_register() failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47417</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47417" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libbpf: Fix memory leak in strset

Free struct strset itself, not just its internal parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47418</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47418" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: fix NULL deref in fifo_set_limit()

syzbot reported another NULL deref in fifo_set_limit() [1]

I could repro the issue with :

unshare -n
tc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit
tc qd replace dev lo parent 1:0 pfifo_fast
tc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit

pfifo_fast does not have a change() operation.
Make fifo_set_limit() more robust about this.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000
RBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947
R10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910
R13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800
FS:  00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 fifo_set_limit net/sched/sch_fifo.c:242 [inline]
 fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227
 tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418
 qdisc_change net/sched/sch_api.c:1332 [inline]
 tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47419</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_taprio: properly cancel timer from taprio_destroy()

There is a comment in qdisc_create() about us not calling ops-&gt;reset()
in some cases.

err_out4:
	/*
	 * Any broken qdiscs that would require a ops-&gt;reset() here?
	 * The qdisc was never in action so it shouldn't be necessary.
	 */

As taprio sets a timer before actually receiving a packet, we need
to cancel it from ops-&gt;destroy, just in case ops-&gt;reset has not
been called.

syzbot reported:

ODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22
WARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Modules linked in:
CPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 &lt;0f&gt; 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3
RSP: 0018:ffffc9000130f330 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000
RDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020
R13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000
FS:  0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __debug_check_no_obj_freed lib/debugobjects.c:987 [inline]
 debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018
 slab_free_hook mm/slub.c:1603 [inline]
 slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653
 slab_free mm/slub.c:3213 [inline]
 kfree+0xe4/0x540 mm/slub.c:4267
 qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299
 tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2457
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47420</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47420" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix a potential ttm-&gt;sg memory leak

Memory is allocated for ttm-&gt;sg by kmalloc in kfd_mem_dmamap_userptr,
but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47421</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47421" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume

In current code, when a PCI error state pci_channel_io_normal is detectd,
it will report PCI_ERS_RESULT_CAN_RECOVER status to PCI driver, and PCI
driver will continue the execution of PCI resume callback report_resume by
pci_walk_bridge, and the callback will go into amdgpu_pci_resume
finally, where write lock is releasd unconditionally without acquiring
such lock first. In this case, a deadlock will happen when other threads
start to acquire the read lock.

To fix this, add a member in amdgpu_device strucutre to cache
pci_channel_state, and only continue the execution in amdgpu_pci_resume
when it's pci_channel_io_frozen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47422</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47422" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/kms/nv50-: fix file release memory leak

When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47423</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47423" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/debugfs: fix file release memory leak

When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47424</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47424" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix freeing of uninitialized misc IRQ vector

When VSI set up failed in i40e_probe() as part of PF switch set up
driver was trying to free misc IRQ vectors in
i40e_clear_interrupt_scheme and produced a kernel Oops:

   Trying to free already-free IRQ 266
   WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300
   Workqueue: events work_for_cpu_fn
   RIP: 0010:__free_irq+0x9a/0x300
   Call Trace:
   ? synchronize_irq+0x3a/0xa0
   free_irq+0x2e/0x60
   i40e_clear_interrupt_scheme+0x53/0x190 [i40e]
   i40e_probe.part.108+0x134b/0x1a40 [i40e]
   ? kmem_cache_alloc+0x158/0x1c0
   ? acpi_ut_update_ref_count.part.1+0x8e/0x345
   ? acpi_ut_update_object_reference+0x15e/0x1e2
   ? strstr+0x21/0x70
   ? irq_get_irq_data+0xa/0x20
   ? mp_check_pin_attr+0x13/0xc0
   ? irq_get_irq_data+0xa/0x20
   ? mp_map_pin_to_irq+0xd3/0x2f0
   ? acpi_register_gsi_ioapic+0x93/0x170
   ? pci_conf1_read+0xa4/0x100
   ? pci_bus_read_config_word+0x49/0x70
   ? do_pci_enable_device+0xcc/0x100
   local_pci_probe+0x41/0x90
   work_for_cpu_fn+0x16/0x20
   process_one_work+0x1a7/0x360
   worker_thread+0x1cf/0x390
   ? create_worker+0x1a0/0x1a0
   kthread+0x112/0x130
   ? kthread_flush_work_fn+0x10/0x10
   ret_from_fork+0x1f/0x40

The problem is that at that point misc IRQ vectors
were not allocated yet and we get a call trace
that driver is trying to free already free IRQ vectors.

Add a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED
PF state before calling i40e_free_misc_vector. This state is set only if
misc IRQ vectors were properly initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47425</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47425" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: acpi: fix resource leak in reconfiguration device addition

acpi_i2c_find_adapter_by_handle() calls bus_find_device() which takes a
reference on the adapter which is never released which will result in a
reference count leak and render the adapter unremovable.  Make sure to
put the adapter after creating the client in the same manner that we do
for OF.

[wsa: fixed title]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47426</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47426" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, s390: Fix potential memory leak about jit_data

Make sure to free jit_data through kfree() in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47427</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47427" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: Fix iscsi_task use after free

Commit d39df158518c ("scsi: iscsi: Have abort handler get ref to conn")
added iscsi_get_conn()/iscsi_put_conn() calls during abort handling but
then also changed the handling of the case where we detect an already
completed task where we now end up doing a goto to the common put/cleanup
code. This results in a iscsi_task use after free, because the common
cleanup code will do a put on the iscsi_task.

This reverts the goto and moves the iscsi_get_conn() to after we've checked
if the iscsi_task is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47428</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47428" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: fix program check interrupt emergency stack path

Emergency stack path was jumping into a 3: label inside the
__GEN_COMMON_BODY macro for the normal path after it had finished,
rather than jumping over it. By a small miracle this is the correct
place to build up a new interrupt frame with the existing stack
pointer, so things basically worked okay with an added weird looking
700 trap frame on top (which had the wrong -&gt;nip so it didn't decode
bug messages either).

Fix this by avoiding using numeric labels when jumping over non-trivial
macros.

Before:

 LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
 Modules linked in:
 CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637
 NIP:  7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0
 REGS: c0000000fffb3a50 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 00000700  XER: 20040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006c964 c0000000fffb3cf0 c000000001513800 0000000000000000
 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
 NIP [7265677368657265] 0x7265677368657265
 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
 Call Trace:
 [c0000000fffb3cf0] [c00000000000bdac] soft_nmi_common+0x13c/0x1d0 (unreliable)
 --- interrupt: 700 at decrementer_common_virt+0xb8/0x230
 NIP:  c0000000000098b8 LR: c00000000006c0c8 CTR: c0000000000097f0
 REGS: c0000000fffb3d60 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 22424282  XER: 20040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006c964 0000000000002400 c000000001513800 0000000000000000
 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
 NIP [c0000000000098b8] decrementer_common_virt+0xb8/0x230
 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
 --- interrupt: 700
 Instruction dump:
 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
 ---[ end trace 6d28218e0cc3c949 ]---

After:

 ------------[ cut here ]------------
 kernel BUG at arch/powerpc/kernel/exceptions-64s.S:491!
 Oops: Exception in kernel mode, sig: 5 [#1]
 LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
 Modules linked in:
 CPU: 0 PID: 88 Comm: login Not tainted 5.15.0-rc2-00034-ge057cdade6e5-dirty #2638
 NIP:  c0000000000098b8 LR: c00000000006bf04 CTR: c0000000000097f0
 REGS: c0000000fffb3d60 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 24482227  XER: 00040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006bf04 0000000000002400 c000000001513800 c000000001271868
 GPR04: 00000000100f0d29 0000000042000000 0000000000000007 0000000000000009
 GPR08: 00000000100f0d29 0000000024482227 0000000000002710 c000000000181b3c
 GPR12: 9000000000009033 c0000000016b0000 00000000100f0d29 c000000005b22f00
 GPR16: 00000000ffff0000 0000000000000001 0000000000000009 00000000100eed90
 GPR20: 00000000100eed90 00000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47429</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47429" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: Fix unrecoverable MCE calling async handler from NMI

The machine check handler is not considered NMI on 64s. The early
handler is the true NMI handler, and then it schedules the
machine_check_exception handler to run when interrupts are enabled.

This works fine except the case of an unrecoverable MCE, where the true
NMI is taken when MSR[RI] is clear, it can not recover, so it calls
machine_check_exception directly so something might be done about it.

Calling an async handler from NMI context can result in irq state and
other things getting corrupted. This can also trigger the BUG at
  arch/powerpc/include/asm/interrupt.h:168
  BUG_ON(!arch_irq_disabled_regs(regs) &amp;&amp; !(regs-&gt;msr &amp; MSR_EE));

Fix this by making an _async version of the handler which is called
in the normal case, and a NMI version that is called for unrecoverable
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227553">SUSE bug 1227553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47430</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47430" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n

Commit

  3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks")

added a warning if AC is set when in the kernel.

Commit

  662a0221893a3d ("x86/entry: Fix AC assertion")

changed the warning to only fire if the CPU supports SMAP.

However, the warning can still trigger on a machine that supports SMAP
but where it's disabled in the kernel config and when running the
syscall_nt selftest, for example:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 49 at irqentry_enter_from_user_mode
  CPU: 0 PID: 49 Comm: init Tainted: G                T 5.15.0-rc4+ #98 e6202628ee053b4f310759978284bd8bb0ce6905
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
  RIP: 0010:irqentry_enter_from_user_mode
  ...
  Call Trace:
   ? irqentry_enter
   ? exc_general_protection
   ? asm_exc_general_protection
   ? asm_exc_general_protectio

IS_ENABLED(CONFIG_X86_SMAP) could be added to the warning condition, but
even this would not be enough in case SMAP is disabled at boot time with
the "nosmap" parameter.

To be consistent with "nosmap" behaviour, clear X86_FEATURE_SMAP when
!CONFIG_X86_SMAP.

Found using entry-fuzz + satrandconfig.

 [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47431</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47431" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix gart.bo pin_count leak

gmc_v{9,10}_0_gart_disable() isn't called matched with
correspoding gart_enbale function in SRIOV case. This will
lead to gart.bo pin_count leak on driver unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47433</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47433" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix abort logic in btrfs_replace_file_extents

Error injection testing uncovered a case where we'd end up with a
corrupt file system with a missing extent in the middle of a file.  This
occurs because the if statement to decide if we should abort is wrong.

The only way we would abort in this case is if we got a ret !=
-EOPNOTSUPP and we called from the file clone code.  However the
prealloc code uses this path too.  Instead we need to abort if there is
an error, and the only error we _don't_ abort on is -EOPNOTSUPP and only
if we came from the clone file code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47434</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47434" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix command ring pointer corruption while aborting a command

The command ring pointer is located at [6:63] bits of the command
ring control register (CRCR). All the control bits like command stop,
abort are located at [0:3] bits. While aborting a command, we read the
CRCR and set the abort bit and write to the CRCR. The read will always
give command ring pointer as all zeros. So we essentially write only
the control bits. Since we split the 64 bit write into two 32 bit writes,
there is a possibility of xHC command ring stopped before the upper
dword (all zeros) is written. If that happens, xHC updates the upper
dword of its internal command ring pointer with all zeros. Next time,
when the command ring is restarted, we see xHC memory access failures.
Fix this issue by only writing to the lower dword of CRCR where all
control bits are located.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47435</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47435" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix mempool NULL pointer race when completing IO

dm_io_dec_pending() calls end_io_acct() first and will then dec md
in-flight pending count. But if a task is swapping DM table at same
time this can result in a crash due to mempool-&gt;elements being NULL:

task1                             task2
do_resume
 -&gt;do_suspend
  -&gt;dm_wait_for_completion
                                  bio_endio
				   -&gt;clone_endio
				    -&gt;dm_io_dec_pending
				     -&gt;end_io_acct
				      -&gt;wakeup task1
 -&gt;dm_swap_table
  -&gt;__bind
   -&gt;__bind_mempools
    -&gt;bioset_exit
     -&gt;mempool_exit
                                     -&gt;free_io

[ 67.330330] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
......
[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)
[ 67.330510] pc : mempool_free+0x70/0xa0
[ 67.330515] lr : mempool_free+0x4c/0xa0
[ 67.330520] sp : ffffff8008013b20
[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004
[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8
[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800
[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800
[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80
[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c
[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd
[ 67.330563] x15: 000000000093b41e x14: 0000000000000010
[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555
[ 67.330574] x11: 0000000000000001 x10: 0000000000000001
[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000
[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a
[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001
[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8
[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970
[ 67.330609] Call trace:
[ 67.330616] mempool_free+0x70/0xa0
[ 67.330627] bio_put+0xf8/0x110
[ 67.330638] dec_pending+0x13c/0x230
[ 67.330644] clone_endio+0x90/0x180
[ 67.330649] bio_endio+0x198/0x1b8
[ 67.330655] dec_pending+0x190/0x230
[ 67.330660] clone_endio+0x90/0x180
[ 67.330665] bio_endio+0x198/0x1b8
[ 67.330673] blk_update_request+0x214/0x428
[ 67.330683] scsi_end_request+0x2c/0x300
[ 67.330688] scsi_io_completion+0xa0/0x710
[ 67.330695] scsi_finish_command+0xd8/0x110
[ 67.330700] scsi_softirq_done+0x114/0x148
[ 67.330708] blk_done_softirq+0x74/0xd0
[ 67.330716] __do_softirq+0x18c/0x374
[ 67.330724] irq_exit+0xb4/0xb8
[ 67.330732] __handle_domain_irq+0x84/0xc0
[ 67.330737] gic_handle_irq+0x148/0x1b0
[ 67.330744] el1_irq+0xe8/0x190
[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538
[ 67.330759] cpuidle_enter_state+0x1fc/0x398
[ 67.330764] cpuidle_enter+0x18/0x20
[ 67.330772] do_idle+0x1b4/0x290
[ 67.330778] cpu_startup_entry+0x20/0x28
[ 67.330786] secondary_start_kernel+0x160/0x170

Fix this by:
1) Establishing pointers to 'struct dm_io' members in
dm_io_dec_pending() so that they may be passed into end_io_acct()
_after_ free_io() is called.
2) Moving end_io_acct() after free_io().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47436</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47436" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: dsps: Fix the probe error path

Commit 7c75bde329d7 ("usb: musb: musb_dsps: request_irq() after
initializing musb") has inverted the calls to
dsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without
updating correctly the error path. dsps_create_musb_pdev() allocates and
registers a new platform device which must be unregistered and freed
with platform_device_unregister(), and this is missing upon
dsps_setup_optional_vbus_irq() error.

While on the master branch it seems not to trigger any issue, I observed
a kernel crash because of a NULL pointer dereference with a v5.10.70
stable kernel where the patch mentioned above was backported. With this
kernel version, -EPROBE_DEFER is returned the first time
dsps_setup_optional_vbus_irq() is called which triggers the probe to
error out without unregistering the platform device. Unfortunately, on
the Beagle Bone Black Wireless, the platform device still living in the
system is being used by the USB Ethernet gadget driver, which during the
boot phase triggers the crash.

My limited knowledge of the musb world prevents me to revert this commit
which was sent to silence a robot warning which, as far as I understand,
does not make sense. The goal of this patch was to prevent an IRQ to
fire before the platform device being registered. I think this cannot
ever happen due to the fact that enabling the interrupts is done by the
-&gt;enable() callback of the platform musb device, and this platform
device must be already registered in order for the core or any other
user to use this callback.

Hence, I decided to fix the error path, which might prevent future
errors on mainline kernels while also fixing older ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47437</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47437" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adis16475: fix deadlock on frequency set

With commit 39c024b51b560
("iio: adis16475: improve sync scale mode handling"), two deadlocks were
introduced:
 1) The call to 'adis_write_reg_16()' was not changed to it's unlocked
    version.
 2) The lock was not being released on the success path of the function.

This change fixes both these issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47438</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47438" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path

Prior to this patch in case mlx5_core_destroy_cq() failed it returns
without completing all destroy operations and that leads to memory leak.
Instead, complete the destroy flow before return error.

Also move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()
to be symmetrical with mlx5_core_create_cq().

kmemleak complains on:

unreferenced object 0xc000000038625100 (size 64):
  comm "ethtool", pid 28301, jiffies 4298062946 (age 785.380s)
  hex dump (first 32 bytes):
    60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0  `.H.......4.....
    02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0  ..........}.....
  backtrace:
    [&lt;000000009e8643cb&gt;] add_res_tree+0xd0/0x270 [mlx5_core]
    [&lt;00000000e7cb8e6c&gt;] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]
    [&lt;000000002a12918f&gt;] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]
    [&lt;00000000cef0a696&gt;] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]
    [&lt;000000009c642c26&gt;] mlx5e_open_cq+0xb4/0x130 [mlx5_core]
    [&lt;0000000058dfa578&gt;] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]
    [&lt;0000000081839561&gt;] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]
    [&lt;0000000009cf05d4&gt;] mlx5e_switch_priv_channels+0xa4/0x230
[mlx5_core]
    [&lt;0000000042bbedd8&gt;] mlx5e_safe_switch_params+0x14c/0x300
[mlx5_core]
    [&lt;0000000004bc9db8&gt;] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]
    [&lt;00000000a0553443&gt;] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]
    [&lt;00000000a8f3d84b&gt;] ethnl_set_privflags+0x234/0x2d0
    [&lt;00000000fd27f27c&gt;] genl_family_rcv_msg_doit+0x108/0x1d0
    [&lt;00000000f495e2bb&gt;] genl_family_rcv_msg+0xe4/0x1f0
    [&lt;00000000646c5c2c&gt;] genl_rcv_msg+0x78/0x120
    [&lt;00000000d53e384e&gt;] netlink_rcv_skb+0x74/0x1a0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47439</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47439" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work

When the ksz module is installed and removed using rmmod, kernel crashes
with null pointer dereferrence error. During rmmod, ksz_switch_remove
function tries to cancel the mib_read_workqueue using
cancel_delayed_work_sync routine and unregister switch from dsa.

During dsa_unregister_switch it calls ksz_mac_link_down, which in turn
reschedules the workqueue since mib_interval is non-zero.
Due to which queue executed after mib_interval and it tries to access
dp-&gt;slave. But the slave is unregistered in the ksz_switch_remove
function. Hence kernel crashes.

To avoid this crash, before canceling the workqueue, resetted the
mib_interval to 0.

v1 -&gt; v2:
-Removed the if condition in ksz_mib_read_work
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47440</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47440" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: encx24j600: check error in devm_regmap_init_encx24j600

devm_regmap_init may return error which caused by like out of memory,
this will results in null pointer dereference later when reading
or writing register:

general protection fault in encx24j600_spi_probe
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
CPU: 0 PID: 286 Comm: spi-encx24j600- Not tainted 5.15.0-rc2-00142-g9978db750e31-dirty #11 9c53a778c1306b1b02359f3c2bbedc0222cba652
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:regcache_cache_bypass drivers/base/regmap/regcache.c:540
Code: 54 41 89 f4 55 53 48 89 fb 48 83 ec 08 e8 26 94 a8 fe 48 8d bb a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4a 03 00 00 4c 8d ab b0 00 00 00 48 8b ab a0 00
RSP: 0018:ffffc900010476b8 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: 0000000000000000
RDX: 0000000000000012 RSI: ffff888002de0000 RDI: 0000000000000094
RBP: ffff888013c9a000 R08: 0000000000000000 R09: fffffbfff3f9cc6a
R10: ffffc900010476e8 R11: fffffbfff3f9cc69 R12: 0000000000000001
R13: 000000000000000a R14: ffff888013c9af54 R15: ffff888013c9ad08
FS:  00007ffa984ab580(0000) GS:ffff88801fe00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055a6384136c8 CR3: 000000003bbe6003 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 encx24j600_spi_probe drivers/net/ethernet/microchip/encx24j600.c:459
 spi_probe drivers/spi/spi.c:397
 really_probe drivers/base/dd.c:517
 __driver_probe_device drivers/base/dd.c:751
 driver_probe_device drivers/base/dd.c:782
 __device_attach_driver drivers/base/dd.c:899
 bus_for_each_drv drivers/base/bus.c:427
 __device_attach drivers/base/dd.c:971
 bus_probe_device drivers/base/bus.c:487
 device_add drivers/base/core.c:3364
 __spi_add_device drivers/spi/spi.c:599
 spi_add_device drivers/spi/spi.c:641
 spi_new_device drivers/spi/spi.c:717
 new_device_store+0x18c/0x1f1 [spi_stub 4e02719357f1ff33f5a43d00630982840568e85e]
 dev_attr_store drivers/base/core.c:2074
 sysfs_kf_write fs/sysfs/file.c:139
 kernfs_fop_write_iter fs/kernfs/file.c:300
 new_sync_write fs/read_write.c:508 (discriminator 4)
 vfs_write fs/read_write.c:594
 ksys_write fs/read_write.c:648
 do_syscall_64 arch/x86/entry/common.c:50
 entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:113

Add error check in devm_regmap_init_encx24j600 to avoid this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47441</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: thermal: Fix out-of-bounds memory accesses

Currently, mlxsw allows cooling states to be set above the maximum
cooling state supported by the driver:

 # cat /sys/class/thermal/thermal_zone2/cdev0/type
 mlxsw_fan
 # cat /sys/class/thermal/thermal_zone2/cdev0/max_state
 10
 # echo 18 &gt; /sys/class/thermal/thermal_zone2/cdev0/cur_state
 # echo $?
 0

This results in out-of-bounds memory accesses when thermal state
transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the
transition table is accessed with a too large index (state) [1].

According to the thermal maintainer, it is the responsibility of the
driver to reject such operations [2].

Therefore, return an error when the state to be set exceeds the maximum
cooling state supported by the driver.

To avoid dead code, as suggested by the thermal maintainer [3],
partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling
device with cooling levels") that tried to interpret these invalid
cooling states (above the maximum) in a special way. The cooling levels
array is not removed in order to prevent the fans going below 20% PWM,
which would cause them to get stuck at 0% PWM.

[1]
BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290
Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5

CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122
Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016
Workqueue: events_freezable_power_ thermal_zone_device_check
Call Trace:
 dump_stack_lvl+0x8b/0xb3
 print_address_description.constprop.0+0x1f/0x140
 kasan_report.cold+0x7f/0x11b
 thermal_cooling_device_stats_update+0x271/0x290
 __thermal_cdev_update+0x15e/0x4e0
 thermal_cdev_update+0x9f/0xe0
 step_wise_throttle+0x770/0xee0
 thermal_zone_device_update+0x3f6/0xdf0
 process_one_work+0xa42/0x1770
 worker_thread+0x62f/0x13e0
 kthread+0x3ee/0x4e0
 ret_from_fork+0x1f/0x30

Allocated by task 1:
 kasan_save_stack+0x1b/0x40
 __kasan_kmalloc+0x7c/0x90
 thermal_cooling_device_setup_sysfs+0x153/0x2c0
 __thermal_cooling_device_register.part.0+0x25b/0x9c0
 thermal_cooling_device_register+0xb3/0x100
 mlxsw_thermal_init+0x5c5/0x7e0
 __mlxsw_core_bus_device_register+0xcb3/0x19c0
 mlxsw_core_bus_device_register+0x56/0xb0
 mlxsw_pci_probe+0x54f/0x710
 local_pci_probe+0xc6/0x170
 pci_device_probe+0x2b2/0x4d0
 really_probe+0x293/0xd10
 __driver_probe_device+0x2af/0x440
 driver_probe_device+0x51/0x1e0
 __driver_attach+0x21b/0x530
 bus_for_each_dev+0x14c/0x1d0
 bus_add_driver+0x3ac/0x650
 driver_register+0x241/0x3d0
 mlxsw_sp_module_init+0xa2/0x174
 do_one_initcall+0xee/0x5f0
 kernel_init_freeable+0x45a/0x4de
 kernel_init+0x1f/0x210
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff8881052f7800
 which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 1016 bytes inside of
 1024-byte region [ffff8881052f7800, ffff8881052f7c00)
The buggy address belongs to the page:
page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0
head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x200000000010200(slab|head|node=0|zone=2)
raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
 ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                                                ^
 ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc

[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47442</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47442" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: digital: fix possible memory leak in digital_in_send_sdd_req()

'skb' is allocated in digital_in_send_sdd_req(), but not free when
digital_in_send_cmd() failed, which will cause memory leak. Fix it
by freeing 'skb' if digital_in_send_cmd() return failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47443</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47443" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()

'params' is allocated in digital_tg_listen_mdaa(), but not free when
digital_send_cmd() failed, which will cause memory leak. Fix it by
freeing 'params' if digital_send_cmd() return failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47444</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read

In commit e11f5bd8228f ("drm: Add support for DP 1.4 Compliance edid
corruption test") the function connector_bad_edid() started assuming
that the memory for the EDID passed to it was big enough to hold
`edid[0x7e] + 1` blocks of data (1 extra for the base block). It
completely ignored the fact that the function was passed `num_blocks`
which indicated how much memory had been allocated for the EDID.

Let's fix this by adding a bounds check.

This is important for handling the case where there's an error in the
first block of the EDID. In that case we will call
connector_bad_edid() without having re-allocated memory based on
`edid[0x7e]`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47445</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47445" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix null pointer dereference on pointer edp

The initialization of pointer dev dereferences pointer edp before
edp is null checked, so there is a potential null pointer deference
issue. Fix this by only dereferencing edp after edp has been null
checked.

Addresses-Coverity: ("Dereference before null check")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47446</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47446" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a4xx: fix error handling in a4xx_gpu_init()

This code returns 1 on error instead of a negative error.  It leads to
an Oops in the caller.  A second problem is that the check for
"if (ret != -ENODATA)" cannot be true because "ret" is set to 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47447</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47447" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a3xx: fix error handling in a3xx_gpu_init()

These error paths returned 1 on failure, instead of a negative error
code.  This would lead to an Oops in the caller.  A second problem is
that the check for "if (ret != -ENODATA)" did not work because "ret" was
set to 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47448</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47448" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix possible stall on recvmsg()

recvmsg() can enter an infinite loop if the caller provides the
MSG_WAITALL, the data present in the receive queue is not sufficient to
fulfill the request, and no more data is received by the peer.

When the above happens, mptcp_wait_data() will always return with
no wait, as the MPTCP_DATA_READY flag checked by such function is
set and never cleared in such code path.

Leveraging the above syzbot was able to trigger an RCU stall:

rcu: INFO: rcu_preempt self-detected stall on CPU
rcu:    0-...!: (10499 ticks this GP) idle=0af/1/0x4000000000000000 softirq=10678/10678 fqs=1
        (t=10500 jiffies g=13089 q=109)
rcu: rcu_preempt kthread starved for 10497 jiffies! g13089 f0x0 RCU_GP_WAIT_FQS(5) -&gt;state=0x0 -&gt;cpu=1
rcu:    Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:28696 pid:   14 ppid:     2 flags:0x00004000
Call Trace:
 context_switch kernel/sched/core.c:4955 [inline]
 __schedule+0x940/0x26f0 kernel/sched/core.c:6236
 schedule+0xd3/0x270 kernel/sched/core.c:6315
 schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1881
 rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1955
 rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2128
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 8510 Comm: syz-executor827 Not tainted 5.15.0-rc2-next-20210920-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0xc8/0x180 mm/kasan/generic.c:189
Code: 38 00 74 ed 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 7a 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 &lt;48&gt; 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 80 38 00
RSP: 0018:ffffc9000cd676c8 EFLAGS: 00000283
RAX: ffffed100e9a110e RBX: ffffed100e9a110f RCX: ffffffff88ea062a
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888074d08870
RBP: ffffed100e9a110e R08: 0000000000000001 R09: ffff888074d08877
R10: ffffed100e9a110e R11: 0000000000000000 R12: ffff888074d08000
R13: ffff888074d08000 R14: ffff888074d08088 R15: ffff888074d08000
FS:  0000555556d8e300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
S:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000180 CR3: 0000000068909000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
 test_and_clear_bit include/asm-generic/bitops/instrumented-atomic.h:83 [inline]
 mptcp_release_cb+0x14a/0x210 net/mptcp/protocol.c:3016
 release_sock+0xb4/0x1b0 net/core/sock.c:3204
 mptcp_wait_data net/mptcp/protocol.c:1770 [inline]
 mptcp_recvmsg+0xfd1/0x27b0 net/mptcp/protocol.c:2080
 inet6_recvmsg+0x11b/0x5e0 net/ipv6/af_inet6.c:659
 sock_recvmsg_nosec net/socket.c:944 [inline]
 ____sys_recvmsg+0x527/0x600 net/socket.c:2626
 ___sys_recvmsg+0x127/0x200 net/socket.c:2670
 do_recvmmsg+0x24d/0x6d0 net/socket.c:2764
 __sys_recvmmsg net/socket.c:2843 [inline]
 __do_sys_recvmmsg net/socket.c:2866 [inline]
 __se_sys_recvmmsg net/socket.c:2859 [inline]
 __x64_sys_recvmmsg+0x20b/0x260 net/socket.c:2859
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fc200d2
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47449</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47449" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix locking for Tx timestamp tracking flush

Commit 4dd0d5c33c3e ("ice: add lock around Tx timestamp tracker flush")
added a lock around the Tx timestamp tracker flow which is used to
cleanup any left over SKBs and prepare for device removal.

This lock is problematic because it is being held around a call to
ice_clear_phy_tstamp. The clear function takes a mutex to send a PHY
write command to firmware. This could lead to a deadlock if the mutex
actually sleeps, and causes the following warning on a kernel with
preemption debugging enabled:

[  715.419426] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:573
[  715.427900] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3100, name: rmmod
[  715.435652] INFO: lockdep is turned off.
[  715.439591] Preemption disabled at:
[  715.439594] [&lt;0000000000000000&gt;] 0x0
[  715.446678] CPU: 52 PID: 3100 Comm: rmmod Tainted: G        W  OE     5.15.0-rc4+ #42 bdd7ec3018e725f159ca0d372ce8c2c0e784891c
[  715.458058] Hardware name: Intel Corporation S2600STQ/S2600STQ, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  715.468483] Call Trace:
[  715.470940]  dump_stack_lvl+0x6a/0x9a
[  715.474613]  ___might_sleep.cold+0x224/0x26a
[  715.478895]  __mutex_lock+0xb3/0x1440
[  715.482569]  ? stack_depot_save+0x378/0x500
[  715.486763]  ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.494979]  ? kfree+0xc1/0x520
[  715.498128]  ? mutex_lock_io_nested+0x12a0/0x12a0
[  715.502837]  ? kasan_set_free_info+0x20/0x30
[  715.507110]  ? __kasan_slab_free+0x10b/0x140
[  715.511385]  ? slab_free_freelist_hook+0xc7/0x220
[  715.516092]  ? kfree+0xc1/0x520
[  715.519235]  ? ice_deinit_lag+0x16c/0x220 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.527359]  ? ice_remove+0x1cf/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.535133]  ? pci_device_remove+0xab/0x1d0
[  715.539318]  ? __device_release_driver+0x35b/0x690
[  715.544110]  ? driver_detach+0x214/0x2f0
[  715.548035]  ? bus_remove_driver+0x11d/0x2f0
[  715.552309]  ? pci_unregister_driver+0x26/0x250
[  715.556840]  ? ice_module_exit+0xc/0x2f [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.564799]  ? __do_sys_delete_module.constprop.0+0x2d8/0x4e0
[  715.570554]  ? do_syscall_64+0x3b/0x90
[  715.574303]  ? entry_SYSCALL_64_after_hwframe+0x44/0xae
[  715.579529]  ? start_flush_work+0x542/0x8f0
[  715.583719]  ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.591923]  ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.599960]  ? wait_for_completion_io+0x250/0x250
[  715.604662]  ? lock_acquire+0x196/0x200
[  715.608504]  ? do_raw_spin_trylock+0xa5/0x160
[  715.612864]  ice_sbq_rw_reg+0x1e6/0x2f0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.620813]  ? ice_reset+0x130/0x130 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.628497]  ? __debug_check_no_obj_freed+0x1e8/0x3c0
[  715.633550]  ? trace_hardirqs_on+0x1c/0x130
[  715.637748]  ice_write_phy_reg_e810+0x70/0xf0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.646220]  ? do_raw_spin_trylock+0xa5/0x160
[  715.650581]  ? ice_ptp_release+0x910/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.658797]  ? ice_ptp_release+0x255/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.667013]  ice_clear_phy_tstamp+0x2c/0x110 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.675403]  ice_ptp_release+0x408/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.683440]  ice_remove+0x560/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.691037]  ? _raw_spin_unlock_irqrestore+0x46/0x73
[  715.696005]  pci_device_remove+0xab/0x1d0
[  715.700018]  __device_release_driver+0x35b/0x690
[  715.704637]  driver_detach+0x214/0x2f0
[  715.708389]  bus_remove_driver+0x11d/0x2f0
[  715.712489]  pci_unregister_driver+0x26/0x250
[  71
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47450" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix host stage-2 PGD refcount

The KVM page-table library refcounts the pages of concatenated stage-2
PGDs individually. However, when running KVM in protected mode, the
host's stage-2 PGD is currently managed by EL2 as a single high-order
compound page, which can cause the refcount of the tail pages to reach 0
when they shouldn't, hence corrupting the page-table.

Fix this by introducing a new hyp_split_page() helper in the EL2 page
allocator (matching the kernel's split_page() function), and make use of
it from host_s2_zalloc_pages_exact().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47451</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47451" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value

Currently, when the rule related to IDLETIMER is added, idletimer_tg timer
structure is initialized by kmalloc on executing idletimer_tg_create
function. However, in this process timer-&gt;timer_type is not defined to
a specific value. Thus, timer-&gt;timer_type has garbage value and it occurs
kernel panic. So, this commit fixes the panic by initializing
timer-&gt;timer_type using kzalloc instead of kmalloc.

Test commands:
    # iptables -A OUTPUT -j IDLETIMER --timeout 1 --label test
    $ cat /sys/class/xt_idletimer/timers/test
      Killed

Splat looks like:
    BUG: KASAN: user-memory-access in alarm_expires_remaining+0x49/0x70
    Read of size 8 at addr 0000002e8c7bc4c8 by task cat/917
    CPU: 12 PID: 917 Comm: cat Not tainted 5.14.0+ #3 79940a339f71eb14fc81aee1757a20d5bf13eb0e
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014
    Call Trace:
     dump_stack_lvl+0x6e/0x9c
     kasan_report.cold+0x112/0x117
     ? alarm_expires_remaining+0x49/0x70
     __asan_load8+0x86/0xb0
     alarm_expires_remaining+0x49/0x70
     idletimer_tg_show+0xe5/0x19b [xt_IDLETIMER 11219304af9316a21bee5ba9d58f76a6b9bccc6d]
     dev_attr_show+0x3c/0x60
     sysfs_kf_seq_show+0x11d/0x1f0
     ? device_remove_bin_file+0x20/0x20
     kernfs_seq_show+0xa4/0xb0
     seq_read_iter+0x29c/0x750
     kernfs_fop_read_iter+0x25a/0x2c0
     ? __fsnotify_parent+0x3d1/0x570
     ? iov_iter_init+0x70/0x90
     new_sync_read+0x2a7/0x3d0
     ? __x64_sys_llseek+0x230/0x230
     ? rw_verify_area+0x81/0x150
     vfs_read+0x17b/0x240
     ksys_read+0xd9/0x180
     ? vfs_write+0x460/0x460
     ? do_syscall_64+0x16/0xc0
     ? lockdep_hardirqs_on+0x79/0x120
     __x64_sys_read+0x43/0x50
     do_syscall_64+0x3b/0xc0
     entry_SYSCALL_64_after_hwframe+0x44/0xae
    RIP: 0033:0x7f0cdc819142
    Code: c0 e9 c2 fe ff ff 50 48 8d 3d 3a ca 0a 00 e8 f5 19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24
    RSP: 002b:00007fff28eee5b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
    RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f0cdc819142
    RDX: 0000000000020000 RSI: 00007f0cdc032000 RDI: 0000000000000003
    RBP: 00007f0cdc032000 R08: 00007f0cdc031010 R09: 0000000000000000
    R10: 0000000000000022 R11: 0000000000000246 R12: 00005607e9ee31f0
    R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47452</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47452" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: skip netdev events generated on netns removal

syzbot reported following (harmless) WARN:

 WARNING: CPU: 1 PID: 2648 at net/netfilter/core.c:468
  nft_netdev_unregister_hooks net/netfilter/nf_tables_api.c:230 [inline]
  nf_tables_unregister_hook include/net/netfilter/nf_tables.h:1090 [inline]
  __nft_release_basechain+0x138/0x640 net/netfilter/nf_tables_api.c:9524
  nft_netdev_event net/netfilter/nft_chain_filter.c:351 [inline]
  nf_tables_netdev_event+0x521/0x8a0 net/netfilter/nft_chain_filter.c:382

reproducer:
unshare -n bash -c 'ip link add br0 type bridge; nft add table netdev t ; \
 nft add chain netdev t ingress \{ type filter hook ingress device "br0" \
 priority 0\; policy drop\; \}'

Problem is that when netns device exit hooks create the UNREGISTER
event, the .pre_exit hook for nf_tables core has already removed the
base hook.  Notifier attempts to do this again.

The need to do base hook unregister unconditionally was needed in the past,
because notifier was last stage where reg-&gt;dev dereference was safe.

Now that nf_tables does the hook removal in .pre_exit, this isn't
needed anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47453" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Avoid crash from unnecessary IDA free

In the remove path, there is an attempt to free the aux_idx IDA whether
it was allocated or not.  This can potentially cause a crash when
unloading the driver on systems that do not initialize support for RDMA.
But, this free cannot be gated by the status bit for RDMA, since it is
allocated if the driver detects support for RDMA at probe time, but the
driver can enter into a state where RDMA is not supported after the IDA
has been allocated at probe time and this would lead to a memory leak.

Initialize aux_idx to an invalid value and check for a valid value when
unloading to determine if an IDA free is necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47454" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/smp: do not decrement idle task preempt count in CPU offline

With PREEMPT_COUNT=y, when a CPU is offlined and then onlined again, we
get:

BUG: scheduling while atomic: swapper/1/0/0x00000000
no locks held by swapper/1/0.
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.15.0-rc2+ #100
Call Trace:
 dump_stack_lvl+0xac/0x108
 __schedule_bug+0xac/0xe0
 __schedule+0xcf8/0x10d0
 schedule_idle+0x3c/0x70
 do_idle+0x2d8/0x4a0
 cpu_startup_entry+0x38/0x40
 start_secondary+0x2ec/0x3a0
 start_secondary_prolog+0x10/0x14

This is because powerpc's arch_cpu_idle_dead() decrements the idle task's
preempt count, for reasons explained in commit a7c2bb8279d2 ("powerpc:
Re-enable preemption before cpu_die()"), specifically "start_secondary()
expects a preempt_count() of 0."

However, since commit 2c669ef6979c ("powerpc/preempt: Don't touch the idle
task's preempt_count during hotplug") and commit f1a0a376ca0c ("sched/core:
Initialize the idle task with preemption disabled"), that justification no
longer holds.

The idle task isn't supposed to re-enable preemption, so remove the
vestigial preempt_enable() from the CPU offline path.

Tested with pseries and powernv in qemu, and pseries on PowerVM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47455</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: Fix possible memory leak in ptp_clock_register()

I got memory leak as follows when doing fault injection test:

unreferenced object 0xffff88800906c618 (size 8):
  comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s)
  hex dump (first 8 bytes):
    70 74 70 30 00 00 00 00                          ptp0....
  backtrace:
    [&lt;00000000312ed458&gt;] __kmalloc_track_caller+0x19f/0x3a0
    [&lt;0000000079f6e2ff&gt;] kvasprintf+0xb5/0x150
    [&lt;0000000026aae54f&gt;] kvasprintf_const+0x60/0x190
    [&lt;00000000f323a5f7&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;000000004e35abdd&gt;] dev_set_name+0xc0/0x100
    [&lt;00000000f20cfe25&gt;] ptp_clock_register+0x9f4/0xd30 [ptp]
    [&lt;000000008bb9f0de&gt;] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]

When posix_clock_register() returns an error, the name allocated
in dev_set_name() will be leaked, the put_device() should be used
to give up the device reference, then the name will be freed in
kobject_cleanup() and other memory will be freed in ptp_clock_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47456</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: peak_pci: peak_pci_remove(): fix UAF

When remove the module peek_pci, referencing 'chan' again after
releasing 'dev' will cause UAF.

Fix this by releasing 'dev' later.

The following log reveals it:

[   35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537
[   35.965513 ] Call Trace:
[   35.965718 ]  dump_stack_lvl+0xa8/0xd1
[   35.966028 ]  print_address_description+0x87/0x3b0
[   35.966420 ]  kasan_report+0x172/0x1c0
[   35.966725 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.967137 ]  ? trace_irq_enable_rcuidle+0x10/0x170
[   35.967529 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.967945 ]  __asan_report_load8_noabort+0x14/0x20
[   35.968346 ]  peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.968752 ]  pci_device_remove+0xa9/0x250
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47457</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47457" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()

Using wait_event_interruptible() to wait for complete transmission,
but do not check the result of wait_event_interruptible() which can be
interrupted. It will result in TX buffer has multiple accessors and
the later process interferes with the previous process.

Following is one of the problems reported by syzbot.

=============================================================
WARNING: CPU: 0 PID: 0 at net/can/isotp.c:840 isotp_tx_timer_handler+0x2e0/0x4c0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc7+ #68
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014
RIP: 0010:isotp_tx_timer_handler+0x2e0/0x4c0
Call Trace:
 &lt;IRQ&gt;
 ? isotp_setsockopt+0x390/0x390
 __hrtimer_run_queues+0xb8/0x610
 hrtimer_run_softirq+0x91/0xd0
 ? rcu_read_lock_sched_held+0x4d/0x80
 __do_softirq+0xe8/0x553
 irq_exit_rcu+0xf8/0x100
 sysvec_apic_timer_interrupt+0x9e/0xc0
 &lt;/IRQ&gt;
 asm_sysvec_apic_timer_interrupt+0x12/0x20

Add result check for wait_event_interruptible() in isotp_sendmsg()
to avoid multiple accessers for tx buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47458</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47458" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: mount fails with buffer overflow in strlen

Starting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an
ocfs2 filesystem with either o2cb or pcmk cluster stack fails with the
trace below.  Problem seems to be that strings for cluster stack and
cluster name are not guaranteed to be null terminated in the disk
representation, while strlcpy assumes that the source string is always
null terminated.  This causes a read outside of the source string
triggering the buffer overflow detection.

  detected buffer overflow in strlen
  ------------[ cut here ]------------
  kernel BUG at lib/string.c:1149!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1
    Debian 5.14.6-2
  RIP: 0010:fortify_panic+0xf/0x11
  ...
  Call Trace:
   ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]
   ocfs2_fill_super+0x359/0x19b0 [ocfs2]
   mount_bdev+0x185/0x1b0
   legacy_get_tree+0x27/0x40
   vfs_get_tree+0x25/0xb0
   path_mount+0x454/0xa20
   __x64_sys_mount+0x103/0x140
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47459</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47459" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv

It will trigger UAF for rx_kref of j1939_priv as following.

        cpu0                                    cpu1
j1939_sk_bind(socket0, ndev0, ...)
j1939_netdev_start
                                        j1939_sk_bind(socket1, ndev0, ...)
                                        j1939_netdev_start
j1939_priv_set
                                        j1939_priv_get_by_ndev_locked
j1939_jsk_add
.....
j1939_netdev_stop
kref_put_lock(&amp;priv-&gt;rx_kref, ...)
                                        kref_get(&amp;priv-&gt;rx_kref, ...)
                                        REFCOUNT_WARN("addition on 0;...")

====================================================
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0
RIP: 0010:refcount_warn_saturate+0x169/0x1e0
Call Trace:
 j1939_netdev_start+0x68b/0x920
 j1939_sk_bind+0x426/0xeb0
 ? security_socket_bind+0x83/0xb0

The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to
protect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47460</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47460" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix data corruption after conversion from inline format

Commit 6dbf7bb55598 ("fs: Don't invalidate page buffers in
block_write_full_page()") uncovered a latent bug in ocfs2 conversion
from inline inode format to a normal inode format.

The code in ocfs2_convert_inline_data_to_extents() attempts to zero out
the whole cluster allocated for file data by grabbing, zeroing, and
dirtying all pages covering this cluster.  However these pages are
beyond i_size, thus writeback code generally ignores these dirty pages
and no blocks were ever actually zeroed on the disk.

This oversight was fixed by commit 693c241a5f6a ("ocfs2: No need to zero
pages past i_size.") for standard ocfs2 write path, inline conversion
path was apparently forgotten; the commit log also has a reasoning why
the zeroing actually is not needed.

After commit 6dbf7bb55598, things became worse as writeback code stopped
invalidating buffers on pages beyond i_size and thus these pages end up
with clean PageDirty bit but with buffers attached to these pages being
still dirty.  So when a file is converted from inline format, then
writeback triggers, and then the file is grown so that these pages
become valid, the invalid dirtiness state is preserved,
mark_buffer_dirty() does nothing on these pages (buffers are already
dirty) but page is never written back because it is clean.  So data
written to these pages is lost once pages are reclaimed.

Simple reproducer for the problem is:

  xfs_io -f -c "pwrite 0 2000" -c "pwrite 2000 2000" -c "fsync" \
    -c "pwrite 4000 2000" ocfs2_file

After unmounting and mounting the fs again, you can observe that end of
'ocfs2_file' has lost its contents.

Fix the problem by not doing the pointless zeroing during conversion
from inline format similarly as in the standard write path.

[akpm@linux-foundation.org: fix whitespace, per Joseph]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47461</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47461" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix a race between writeprotect and exit_mmap()

A race is possible when a process exits, its VMAs are removed by
exit_mmap() and at the same time userfaultfd_writeprotect() is called.

The race was detected by KASAN on a development kernel, but it appears
to be possible on vanilla kernels as well.

Use mmget_not_zero() to prevent the race as done in other userfaultfd
operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47462" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()

syzbot reported access to unitialized memory in mbind() [1]

Issue came with commit bda420b98505 ("numa balancing: migrate on fault
among multiple bound nodes")

This commit added a new bit in MPOL_MODE_FLAGS, but only checked valid
combination (MPOL_F_NUMA_BALANCING can only be used with MPOL_BIND) in
do_set_mempolicy()

This patch moves the check in sanitize_mpol_flags() so that it is also
used by mbind()

  [1]
  BUG: KMSAN: uninit-value in __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   mpol_equal include/linux/mempolicy.h:105 [inline]
   vma_merge+0x4a1/0x1e60 mm/mmap.c:1190
   mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811
   do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  Uninit was created at:
   slab_alloc_node mm/slub.c:3221 [inline]
   slab_alloc mm/slub.c:3230 [inline]
   kmem_cache_alloc+0x751/0xff0 mm/slub.c:3235
   mpol_new mm/mempolicy.c:293 [inline]
   do_mbind+0x912/0x15f0 mm/mempolicy.c:1289
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  =====================================================
  Kernel panic - not syncing: panic_on_kmsan set ...
  CPU: 0 PID: 15049 Comm: syz-executor.0 Tainted: G    B             5.15.0-rc2-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x1ff/0x28e lib/dump_stack.c:106
   dump_stack+0x25/0x28 lib/dump_stack.c:113
   panic+0x44f/0xdeb kernel/panic.c:232
   kmsan_report+0x2ee/0x300 mm/kmsan/report.c:186
   __msan_warning+0xd7/0x150 mm/kmsan/instrumentation.c:208
   __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   mpol_equal include/linux/mempolicy.h:105 [inline]
   vma_merge+0x4a1/0x1e60 mm/mmap.c:1190
   mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811
   do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47463</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47463" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix NULL page-&gt;mapping dereference in page_is_secretmem()

Check for a NULL page-&gt;mapping before dereferencing the mapping in
page_is_secretmem(), as the page's mapping can be nullified while gup()
is running, e.g.  by reclaim or truncation.

  BUG: kernel NULL pointer dereference, address: 0000000000000068
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G        W
  RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0
  Code: &lt;48&gt; 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be
  RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046
  RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900
  ...
  CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0
  Call Trace:
   get_user_pages_fast_only+0x13/0x20
   hva_to_pfn+0xa9/0x3e0
   try_async_pf+0xa1/0x270
   direct_page_fault+0x113/0xad0
   kvm_mmu_page_fault+0x69/0x680
   vmx_handle_exit+0xe1/0x5d0
   kvm_arch_vcpu_ioctl_run+0xd81/0x1c70
   kvm_vcpu_ioctl+0x267/0x670
   __x64_sys_ioctl+0x83/0xa0
   do_syscall_64+0x56/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47464" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: fix possible null-pointer dereference in audit_filter_rules

Fix  possible null-pointer dereference in audit_filter_rules.

audit_filter_rules() error: we previously assumed 'ctx' could be null
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47465</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47465" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()

In commit 10d91611f426 ("powerpc/64s: Reimplement book3s idle code in
C") kvm_start_guest() became idle_kvm_start_guest(). The old code
allocated a stack frame on the emergency stack, but didn't use the
frame to store anything, and also didn't store anything in its caller's
frame.

idle_kvm_start_guest() on the other hand is written more like a normal C
function, it creates a frame on entry, and also stores CR/LR into its
callers frame (per the ABI). The problem is that there is no caller
frame on the emergency stack.

The emergency stack for a given CPU is allocated with:

  paca_ptrs[i]-&gt;emergency_sp = alloc_stack(limit, i) + THREAD_SIZE;

So emergency_sp actually points to the first address above the emergency
stack allocation for a given CPU, we must not store above it without
first decrementing it to create a frame. This is different to the
regular kernel stack, paca-&gt;kstack, which is initialised to point at an
initial frame that is ready to use.

idle_kvm_start_guest() stores the backchain, CR and LR all of which
write outside the allocation for the emergency stack. It then creates a
stack frame and saves the non-volatile registers. Unfortunately the
frame it creates is not large enough to fit the non-volatiles, and so
the saving of the non-volatile registers also writes outside the
emergency stack allocation.

The end result is that we corrupt whatever is at 0-24 bytes, and 112-248
bytes above the emergency stack allocation.

In practice this has gone unnoticed because the memory immediately above
the emergency stack happens to be used for other stack allocations,
either another CPUs mc_emergency_sp or an IRQ stack. See the order of
calls to irqstack_early_init() and emergency_stack_init().

The low addresses of another stack are the top of that stack, and so are
only used if that stack is under extreme pressue, which essentially
never happens in practice - and if it did there's a high likelyhood we'd
crash due to that stack overflowing.

Still, we shouldn't be corrupting someone else's stack, and it is purely
luck that we aren't corrupting something else.

To fix it we save CR/LR into the caller's frame using the existing r1 on
entry, we then create a SWITCH_FRAME_SIZE frame (which has space for
pt_regs) on the emergency stack with the backchain pointing to the
existing stack, and then finally we switch to the new frame on the
emergency stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227904">SUSE bug 1227904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47466</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47466" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: fix potential memoryleak in kmem_cache_open()

In error path, the random_seq of slub cache might be leaked.  Fix this
by using __kmem_cache_release() to release all the relevant resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47467</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47467" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit: fix reference count leak in kfree_at_end

The reference counting issue happens in the normal path of
kfree_at_end(). When kunit_alloc_and_get_resource() is invoked, the
function forgets to handle the returned resource object, whose refcount
increased inside, causing a refcount leak.

Fix this issue by calling kunit_alloc_resource() instead of
kunit_alloc_and_get_resource().

Fixed the following when applying:
Shuah Khan &lt;skhan@linuxfoundation.org&gt;

CHECK: Alignment should match open parenthesis
+	kunit_alloc_resource(test, NULL, kfree_res_free, GFP_KERNEL,
 				     (void *)to_free);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47468</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isdn: mISDN: Fix sleeping function called from invalid context

The driver can call card-&gt;isac.release() function from an atomic
context.

Fix this by calling this function after releasing the lock.

The following log reveals it:

[   44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018
[   44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe
[   44.169574 ] INFO: lockdep is turned off.
[   44.169899 ] irq event stamp: 0
[   44.170160 ] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.170627 ] hardirqs last disabled at (0): [&lt;ffffffff814209ed&gt;] copy_process+0x132d/0x3e00
[   44.171240 ] softirqs last  enabled at (0): [&lt;ffffffff81420a1a&gt;] copy_process+0x135a/0x3e00
[   44.171852 ] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.172318 ] Preemption disabled at:
[   44.172320 ] [&lt;ffffffffa009b0a9&gt;] nj_release+0x69/0x500 [netjet]
[   44.174441 ] Call Trace:
[   44.174630 ]  dump_stack_lvl+0xa8/0xd1
[   44.174912 ]  dump_stack+0x15/0x17
[   44.175166 ]  ___might_sleep+0x3a2/0x510
[   44.175459 ]  ? nj_release+0x69/0x500 [netjet]
[   44.175791 ]  __might_sleep+0x82/0xe0
[   44.176063 ]  ? start_flush_work+0x20/0x7b0
[   44.176375 ]  start_flush_work+0x33/0x7b0
[   44.176672 ]  ? trace_irq_enable_rcuidle+0x85/0x170
[   44.177034 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177372 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177711 ]  __flush_work+0x11a/0x1a0
[   44.177991 ]  ? flush_work+0x20/0x20
[   44.178257 ]  ? lock_release+0x13c/0x8f0
[   44.178550 ]  ? __kasan_check_write+0x14/0x20
[   44.178872 ]  ? do_raw_spin_lock+0x148/0x360
[   44.179187 ]  ? read_lock_is_recursive+0x20/0x20
[   44.179530 ]  ? __kasan_check_read+0x11/0x20
[   44.179846 ]  ? do_raw_spin_unlock+0x55/0x900
[   44.180168 ]  ? ____kasan_slab_free+0x116/0x140
[   44.180505 ]  ? _raw_spin_unlock_irqrestore+0x41/0x60
[   44.180878 ]  ? skb_queue_purge+0x1a3/0x1c0
[   44.181189 ]  ? kfree+0x13e/0x290
[   44.181438 ]  flush_work+0x17/0x20
[   44.181695 ]  mISDN_freedchannel+0xe8/0x100
[   44.182006 ]  isac_release+0x210/0x260 [mISDNipac]
[   44.182366 ]  nj_release+0xf6/0x500 [netjet]
[   44.182685 ]  nj_remove+0x48/0x70 [netjet]
[   44.182989 ]  pci_device_remove+0xa9/0x250
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47469" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: Fix deadlock when adding SPI controllers on SPI buses

Currently we have a global spi_add_lock which we take when adding new
devices so that we can check that we're not trying to reuse a chip
select that's already controlled.  This means that if the SPI device is
itself a SPI controller and triggers the instantiation of further SPI
devices we trigger a deadlock as we try to register and instantiate
those devices while in the process of doing so for the parent controller
and hence already holding the global spi_add_lock.  Since we only care
about concurrency within a single SPI bus move the lock to be per
controller, avoiding the deadlock.

This can be easily triggered in the case of spi-mux.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47470</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47470" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: fix potential use-after-free in slab_debugfs_fops

When sysfs_slab_add failed, we shouldn't call debugfs_slab_add() for s
because s will be freed soon.  And slab_debugfs_fops will use s later
leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47471</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47471" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: mxsfb: Fix NULL pointer dereference crash on unload

The mxsfb-&gt;crtc.funcs may already be NULL when unloading the driver,
in which case calling mxsfb_irq_disable() via drm_irq_uninstall() from
mxsfb_unload() leads to NULL pointer dereference.

Since all we care about is masking the IRQ and mxsfb-&gt;base is still
valid, just use that to clear and mask the IRQ.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47472</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47472" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47473</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47473" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()

Commit 8c0eb596baa5 ("[SCSI] qla2xxx: Fix a memory leak in an error path of
qla2x00_process_els()"), intended to change:

        bsg_job-&gt;request-&gt;msgcode == FC_BSG_HST_ELS_NOLOGIN


        bsg_job-&gt;request-&gt;msgcode != FC_BSG_RPT_ELS

but changed it to:

        bsg_job-&gt;request-&gt;msgcode == FC_BSG_RPT_ELS

instead.

Change the == to a != to avoid leaking the fcport structure or freeing
unallocated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47474</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47474" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix bulk-buffer overflow

The driver is using endpoint-sized buffers but must not assume that the
tx and rx buffers are of equal size or a malicious device could overflow
the slab-allocated receive buffer when doing bulk transfers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47475</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47475" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix transfer-buffer overflows

The driver uses endpoint-sized USB transfer buffers but up until
recently had no sanity checks on the sizes.

Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize
of usb endpoints found") inadvertently fixed NULL-pointer dereferences
when accessing the transfer buffers in case a malicious device has a
zero wMaxPacketSize.

Make sure to allocate buffers large enough to handle also the other
accesses that are done without a size check (e.g. byte 18 in
vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond
the buffers, for example, when doing descriptor fuzzing.

The original driver was for a low-speed device with 8-byte buffers.
Support was later added for a device that uses bulk transfers and is
presumably a full-speed device with a maximum 64-byte wMaxPacketSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47476</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47476" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: ni_usb6501: fix NULL-deref in command paths

The driver uses endpoint-sized USB transfer buffers but had no sanity
checks on the sizes. This can lead to zero-size-pointer dereferences or
overflowed transfer buffers in ni6501_port_command() and
ni6501_counter_command() if a (malicious) device has smaller max-packet
sizes than expected (or when doing descriptor fuzz testing).

Add the missing sanity checks to probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47477</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: dt9812: fix DMA buffers on stack

USB transfer buffers are typically mapped for DMA and must not be
allocated on the stack or transfers will fail.

Allocate proper transfer buffers in the various command helpers and
return an error on short transfers instead of acting on random stack
data.

Note that this also fixes a stack info leak on systems where DMA is not
used as 32 bytes are always sent to the device regardless of how short
the command is.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47478</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47478" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isofs: Fix out of bound access for corrupted isofs image

When isofs image is suitably corrupted isofs_read_inode() can read data
beyond the end of buffer. Sanity-check the directory entry length before
using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47479</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47479" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8712: fix use-after-free in rtl8712_dl_fw

Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in
race condition between r871xu_dev_remove() -&gt;ndo_open() callback.

It's easy to see from crash log, that driver accesses released firmware
in -&gt;ndo_open() callback. It may happen, since driver was releasing
firmware _before_ unregistering netdev. Fix it by moving
unregister_netdev() before cleaning up resources.

Call Trace:
...
 rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline]
 rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170
 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline]
 rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394
 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380
 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484

Freed by task 1306:
...
 release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053
 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599
 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47480</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47480" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Put LLD module refcnt after SCSI device is released

SCSI host release is triggered when SCSI device is freed. We have to make
sure that the low-level device driver module won't be unloaded before SCSI
host instance is released because shost-&gt;hostt is required in the release
handler.

Make sure to put LLD module refcnt after SCSI device is released.

Fixes a kernel panic of 'BUG: unable to handle page fault for address'
reported by Changhui and Yi.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47481</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47481" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR

Normally the zero fill would hide the missing initialization, but an
errant set to desc_size in reg_create() causes a crash:

  BUG: unable to handle page fault for address: 0000000800000000
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 5 PID: 890 Comm: ib_write_bw Not tainted 5.15.0-rc4+ #47
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:mlx5_ib_dereg_mr+0x14/0x3b0 [mlx5_ib]
  Code: 48 63 cd 4c 89 f7 48 89 0c 24 e8 37 30 03 e1 48 8b 0c 24 eb a0 90 0f 1f 44 00 00 41 56 41 55 41 54 55 53 48 89 fb 48 83 ec 30 &lt;48&gt; 8b 2f 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 8b 87 c8
  RSP: 0018:ffff88811afa3a60 EFLAGS: 00010286
  RAX: 000000000000001c RBX: 0000000800000000 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000800000000
  RBP: 0000000800000000 R08: 0000000000000000 R09: c0000000fffff7ff
  R10: ffff88811afa38f8 R11: ffff88811afa38f0 R12: ffffffffa02c7ac0
  R13: 0000000000000000 R14: ffff88811afa3cd8 R15: ffff88810772fa00
  FS:  00007f47b9080740(0000) GS:ffff88852cd40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000800000000 CR3: 000000010761e003 CR4: 0000000000370ea0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   mlx5_ib_free_odp_mr+0x95/0xc0 [mlx5_ib]
   mlx5_ib_dereg_mr+0x128/0x3b0 [mlx5_ib]
   ib_dereg_mr_user+0x45/0xb0 [ib_core]
   ? xas_load+0x8/0x80
   destroy_hw_idr_uobject+0x1a/0x50 [ib_uverbs]
   uverbs_destroy_uobject+0x2f/0x150 [ib_uverbs]
   uobj_destroy+0x3c/0x70 [ib_uverbs]
   ib_uverbs_cmd_verbs+0x467/0xb00 [ib_uverbs]
   ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]
   ? ttwu_queue_wakelist+0xa9/0xe0
   ? pty_write+0x85/0x90
   ? file_tty_write.isra.33+0x214/0x330
   ? process_echoes+0x60/0x60
   ib_uverbs_ioctl+0xa7/0x110 [ib_uverbs]
   __x64_sys_ioctl+0x10d/0x8e0
   ? vfs_write+0x17f/0x260
   do_syscall_64+0x3c/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Add the missing xarray initialization and remove the desc_size set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47482</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47482" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: batman-adv: fix error handling

Syzbot reported ODEBUG warning in batadv_nc_mesh_free(). The problem was
in wrong error handling in batadv_mesh_init().

Before this patch batadv_mesh_init() was calling batadv_mesh_free() in case
of any batadv_*_init() calls failure. This approach may work well, when
there is some kind of indicator, which can tell which parts of batadv are
initialized; but there isn't any.

All written above lead to cleaning up uninitialized fields. Even if we hide
ODEBUG warning by initializing bat_priv-&gt;nc.work, syzbot was able to hit
GPF in batadv_nc_purge_paths(), because hash pointer in still NULL. [1]

To fix these bugs we can unwind batadv_*_init() calls one by one.
It is good approach for 2 reasons: 1) It fixes bugs on error handling
path 2) It improves the performance, since we won't call unneeded
batadv_*_free() functions.

So, this patch makes all batadv_*_init() clean up all allocated memory
before returning with an error to no call correspoing batadv_*_free()
and open-codes batadv_mesh_free() with proper order to avoid touching
uninitialized fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47483</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47483" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: Fix possible double-free in regcache_rbtree_exit()

In regcache_rbtree_insert_to_block(), when 'present' realloc failed,
the 'blk' which is supposed to assign to 'rbnode-&gt;block' will be freed,
so 'rbnode-&gt;block' points a freed memory, in the error handling path of
regcache_rbtree_init(), 'rbnode-&gt;block' will be freed again in
regcache_rbtree_exit(), KASAN will report double-free as follows:

BUG: KASAN: double-free or invalid-free in kfree+0xce/0x390
Call Trace:
 slab_free_freelist_hook+0x10d/0x240
 kfree+0xce/0x390
 regcache_rbtree_exit+0x15d/0x1a0
 regcache_rbtree_init+0x224/0x2c0
 regcache_init+0x88d/0x1310
 __regmap_init+0x3151/0x4a80
 __devm_regmap_init+0x7d/0x100
 madera_spi_probe+0x10f/0x333 [madera_spi]
 spi_probe+0x183/0x210
 really_probe+0x285/0xc30

To fix this, moving up the assignment of rbnode-&gt;block to immediately after
the reallocation has succeeded so that the data structure stays valid even
if the second reallocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224908">SUSE bug 1224908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47484" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Fix possible null pointer dereference.

This patch fixes possible null pointer dereference in files
"rvu_debugfs.c" and "rvu_nix.c"
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47485</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields

Overflowing either addrlimit or bytes_togo can allow userspace to trigger
a buffer overflow of kernel memory. Check for overflows in all the places
doing math on user controlled buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47486</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47486" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv, bpf: Fix potential NULL dereference

The bpf_jit_binary_free() function requires a non-NULL argument. When
the RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,
jit_data-&gt;header will be NULL, which triggers a NULL
dereference. Avoid this by checking the argument, prior calling the
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47488</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47488" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47489</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47489" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix even more out of bound writes from debugfs

CVE-2021-42327 was fixed by:

commit f23750b5b3d98653b31d4469592935ef6364ad67
Author: Thelford Williams &lt;tdwilliamsiv@gmail.com&gt;
Date:   Wed Oct 13 16:04:13 2021 -0400

    drm/amdgpu: fix out of bounds write

but amdgpu_dm_debugfs.c contains more of the same issue so fix the
remaining ones.

v2:
	* Add missing fix in dp_max_bpc_write (Harry Wentland)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47490</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: fix memleak in ttm_transfered_destroy

We need to cleanup the fences for ghost objects as well.

Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214029
Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214447
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47491</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: khugepaged: skip huge page collapse for special files

The read-only THP for filesystems will collapse THP for files opened
readonly and mapped with VM_EXEC.  The intended usecase is to avoid TLB
misses for large text segments.  But it doesn't restrict the file types
so a THP could be collapsed for a non-regular file, for example, block
device, if it is opened readonly and mapped with EXEC permission.  This
may cause bugs, like [1] and [2].

This is definitely not the intended usecase, so just collapse THP for
regular files in order to close the attack surface.

[shy828301@gmail.com: fix vm_file check [3]]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47492</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, thp: bail out early in collapse_file for writeback page

Currently collapse_file does not explicitly check PG_writeback, instead,
page_has_private and try_to_release_page are used to filter writeback
pages.  This does not work for xfs with blocksize equal to or larger
than pagesize, because in such case xfs has no page-&gt;private.

This makes collapse_file bail out early for writeback page.  Otherwise,
xfs end_page_writeback will panic as follows.

  page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32
  aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:"libtest.so"
  flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)
  raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8
  raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000
  page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u &lt;= 127u))
  page-&gt;mem_cgroup:ffff0000c3e9a000
  ------------[ cut here ]------------
  kernel BUG at include/linux/mm.h:1212!
  Internal error: Oops - BUG: 0 [#1] SMP
  Modules linked in:
  BUG: Bad page state in process khugepaged  pfn:84ef32
   xfs(E)
  page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32
   libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...
  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)
  Call trace:
    end_page_writeback+0x1c0/0x214
    iomap_finish_page_writeback+0x13c/0x204
    iomap_finish_ioend+0xe8/0x19c
    iomap_writepage_end_bio+0x38/0x50
    bio_endio+0x168/0x1ec
    blk_update_request+0x278/0x3f0
    blk_mq_end_request+0x34/0x15c
    virtblk_request_done+0x38/0x74 [virtio_blk]
    blk_done_softirq+0xc4/0x110
    __do_softirq+0x128/0x38c
    __irq_exit_rcu+0x118/0x150
    irq_exit+0x1c/0x30
    __handle_domain_irq+0x8c/0xf0
    gic_handle_irq+0x84/0x108
    el1_irq+0xcc/0x180
    arch_cpu_idle+0x18/0x40
    default_idle_call+0x4c/0x1a0
    cpuidle_idle_call+0x168/0x1e0
    do_idle+0xb4/0x104
    cpu_startup_entry+0x30/0x9c
    secondary_start_kernel+0x104/0x180
  Code: d4210000 b0006161 910c8021 94013f4d (d4210000)
  ---[ end trace 4a88c6a074082f8c ]---
  Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47493</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix race between searching chunks and release journal_head from buffer_head

Encountered a race between ocfs2_test_bg_bit_allocatable() and
jbd2_journal_put_journal_head() resulting in the below vmcore.

  PID: 106879  TASK: ffff880244ba9c00  CPU: 2   COMMAND: "loop3"
  Call trace:
    panic
    oops_end
    no_context
    __bad_area_nosemaphore
    bad_area_nosemaphore
    __do_page_fault
    do_page_fault
    page_fault
      [exception RIP: ocfs2_block_group_find_clear_bits+316]
    ocfs2_block_group_find_clear_bits [ocfs2]
    ocfs2_cluster_group_search [ocfs2]
    ocfs2_search_chain [ocfs2]
    ocfs2_claim_suballoc_bits [ocfs2]
    __ocfs2_claim_clusters [ocfs2]
    ocfs2_claim_clusters [ocfs2]
    ocfs2_local_alloc_slide_window [ocfs2]
    ocfs2_reserve_local_alloc_bits [ocfs2]
    ocfs2_reserve_clusters_with_limit [ocfs2]
    ocfs2_reserve_clusters [ocfs2]
    ocfs2_lock_refcount_allocators [ocfs2]
    ocfs2_make_clusters_writable [ocfs2]
    ocfs2_replace_cow [ocfs2]
    ocfs2_refcount_cow [ocfs2]
    ocfs2_file_write_iter [ocfs2]
    lo_rw_aio
    loop_queue_work
    kthread_worker_fn
    kthread
    ret_from_fork

When ocfs2_test_bg_bit_allocatable() called bh2jh(bg_bh), the
bg_bh-&gt;b_private NULL as jbd2_journal_put_journal_head() raced and
released the jounal head from the buffer head.  Needed to take bit lock
for the bit 'BH_JournalHead' to fix this race.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47494</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47494" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: fix management registrations locking

The management registrations locking was broken, the list was
locked for each wdev, but cfg80211_mgmt_registrations_update()
iterated it without holding all the correct spinlocks, causing
list corruption.

Rather than trying to fix it with fine-grained locking, just
move the lock to the wiphy/rdev (still need the list on each
wdev), we already need to hold the wdev lock to change it, so
there's no contention on the lock in any case. This trivially
fixes the bug since we hold one wdev's lock already, and now
will hold the lock that protects all lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47495</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: sanity check for maxpacket

maxpacket of 0 makes no sense and oopses as we need to divide
by it. Give up.

V2: fixed typo in log and stylistic issues
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47496</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tls: Fix flipped sign in tls_err_abort() calls

sk-&gt;sk_err appears to expect a positive value, a convention that ktls
doesn't always follow and that leads to memory corruption in other code.
For instance,

    [kworker]
    tls_encrypt_done(..., err=&lt;negative error from crypto request&gt;)
      tls_err_abort(.., err)
        sk-&gt;sk_err = err;

    [task]
    splice_from_pipe_feed
      ...
        tls_sw_do_sendpage
          if (sk-&gt;sk_err) {
            ret = -sk-&gt;sk_err;  // ret is positive

    splice_from_pipe_feed (continued)
      ret = actor(...)  // ret is still positive and interpreted as bytes
                        // written, resulting in underflow of buf-&gt;len and
                        // sd-&gt;len, leading to huge buf-&gt;offset and bogus
                        // addresses computed in later calls to actor()

Fix all tls_err_abort() callers to pass a negative error code
consistently and centralize the error-prone sign flip there, throwing in
a warning to catch future misuse and uninlining the function so it
really does only warn once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227656">SUSE bug 1227656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47497</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells

If a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic

 *p &amp;= GENMASK((cell-&gt;nbits%BITS_PER_BYTE) - 1, 0);

will become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we
subtract one from that making a large number that is then shifted more than the
number of bits that fit into an unsigned long.

UBSAN reports this problem:

 UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8
 shift exponent 64 is too large for 64-bit type 'unsigned long'
 CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9
 Hardware name: Google Lazor (rev3+) with KB Backlight (DT)
 Workqueue: events_unbound deferred_probe_work_func
 Call trace:
  dump_backtrace+0x0/0x170
  show_stack+0x24/0x30
  dump_stack_lvl+0x64/0x7c
  dump_stack+0x18/0x38
  ubsan_epilogue+0x10/0x54
  __ubsan_handle_shift_out_of_bounds+0x180/0x194
  __nvmem_cell_read+0x1ec/0x21c
  nvmem_cell_read+0x58/0x94
  nvmem_cell_read_variable_common+0x4c/0xb0
  nvmem_cell_read_variable_le_u32+0x40/0x100
  a6xx_gpu_init+0x170/0x2f4
  adreno_bind+0x174/0x284
  component_bind_all+0xf0/0x264
  msm_drm_bind+0x1d8/0x7a0
  try_to_bring_up_master+0x164/0x1ac
  __component_add+0xbc/0x13c
  component_add+0x20/0x2c
  dp_display_probe+0x340/0x384
  platform_probe+0xc0/0x100
  really_probe+0x110/0x304
  __driver_probe_device+0xb8/0x120
  driver_probe_device+0x4c/0xfc
  __device_attach_driver+0xb0/0x128
  bus_for_each_drv+0x90/0xdc
  __device_attach+0xc8/0x174
  device_initial_probe+0x20/0x2c
  bus_probe_device+0x40/0xa4
  deferred_probe_work_func+0x7c/0xb8
  process_one_work+0x128/0x21c
  process_scheduled_works+0x40/0x54
  worker_thread+0x1ec/0x2a8
  kthread+0x138/0x158
  ret_from_fork+0x10/0x20

Fix it by making sure there are any bits to mask out.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227655">SUSE bug 1227655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47498</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm rq: don't queue request to blk-mq during DM suspend

DM uses blk-mq's quiesce/unquiesce to stop/start device mapper queue.

But blk-mq's unquiesce may come from outside events, such as elevator
switch, updating nr_requests or others, and request may come during
suspend, so simply ask for blk-mq to requeue it.

Fixes one kernel panic issue when running updating nr_requests and
dm-mpath suspend/resume stress test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47499</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47499" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove

When ACPI type is ACPI_SMO8500, the data-&gt;dready_trig will not be set, the
memory allocated by iio_triggered_buffer_setup() will not be freed, and cause
memory leak as follows:

unreferenced object 0xffff888009551400 (size 512):
  comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s)
  hex dump (first 32 bytes):
    02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff  ........ .......
  backtrace:
    [&lt;0000000041ce75ee&gt;] kmem_cache_alloc_trace+0x16d/0x360
    [&lt;000000000aeb17b0&gt;] iio_kfifo_allocate+0x41/0x130 [kfifo_buf]
    [&lt;000000004b40c1f5&gt;] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer]
    [&lt;000000004375b15f&gt;] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013]

Fix it by remove data-&gt;dready_trig condition in probe and remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47500</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: mma8452: Fix trigger reference couting

The mma8452 driver directly assigns a trigger to the struct iio_dev. The
IIO core when done using this trigger will call `iio_trigger_put()` to drop
the reference count by 1.

Without the matching `iio_trigger_get()` in the driver the reference count
can reach 0 too early, the trigger gets freed while still in use and a
use-after-free occurs.

Fix this by getting a reference to the trigger before assigning it to the
IIO device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227698">SUSE bug 1227698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47501</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc

When trying to dump VFs VSI RX/TX descriptors
using debugfs there was a crash
due to NULL pointer dereference in i40e_dbg_dump_desc.
Added a check to i40e_dbg_dump_desc that checks if
VSI type is correct for dumping RX/TX descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47502</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd934x: handle channel mappping list correctly

Currently each channel is added as list to dai channel list, however
there is danger of adding same channel to multiple dai channel list
which endups corrupting the other list where its already added.

This patch ensures that the channel is actually free before adding to
the dai channel list and also ensures that the channel is on the list
before deleting it.

This check was missing previously, and we did not hit this issue as
we were testing very simple usecases with sequence of amixer commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227699">SUSE bug 1227699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47503</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc()

Calling scsi_remove_host() before scsi_add_host() results in a crash:

 BUG: kernel NULL pointer dereference, address: 0000000000000108
 RIP: 0010:device_del+0x63/0x440
 Call Trace:
  device_unregister+0x17/0x60
  scsi_remove_host+0xee/0x2a0
  pm8001_pci_probe+0x6ef/0x1b90 [pm80xx]
  local_pci_probe+0x3f/0x90

We cannot call scsi_remove_host() in pm8001_alloc() because scsi_add_host()
has not been called yet at that point in time.

Function call tree:

  pm8001_pci_probe()
  |
  `- pm8001_pci_alloc()
  |  |
  |  `- pm8001_alloc()
  |     |
  |     `- scsi_remove_host()
  |
  `- scsi_add_host()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47505</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aio: fix use-after-free due to missing POLLFREE handling

signalfd_poll() and binder_poll() are special in that they use a
waitqueue whose lifetime is the current task, rather than the struct
file as is normally the case.  This is okay for blocking polls, since a
blocking poll occurs within one task; however, non-blocking polls
require another solution.  This solution is for the queue to be cleared
before it is freed, by sending a POLLFREE notification to all waiters.

Unfortunately, only eventpoll handles POLLFREE.  A second type of
non-blocking poll, aio poll, was added in kernel v4.18, and it doesn't
handle POLLFREE.  This allows a use-after-free to occur if a signalfd or
binder fd is polled with aio poll, and the waitqueue gets freed.

Fix this by making aio poll handle POLLFREE.

A patch by Ramji Jiyani &lt;ramjiyani@google.com&gt;
(https://lore.kernel.org/r/20211027011834.2497484-1-ramjiyani@google.com)
tried to do this by making aio_poll_wake() always complete the request
inline if POLLFREE is seen.  However, that solution had two bugs.
First, it introduced a deadlock, as it unconditionally locked the aio
context while holding the waitqueue lock, which inverts the normal
locking order.  Second, it didn't consider that POLLFREE notifications
are missed while the request has been temporarily de-queued.

The second problem was solved by my previous patch.  This patch then
properly fixes the use-after-free by handling POLLFREE in a
deadlock-free way.  It does this by taking advantage of the fact that
freeing of the waitqueue is RCU-delayed, similar to what eventpoll does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227652">SUSE bug 1227652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47506</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix use-after-free due to delegation race

A delegation break could arrive as soon as we've called vfs_setlease.  A
delegation break runs a callback which immediately (in
nfsd4_cb_recall_prepare) adds the delegation to del_recall_lru.  If we
then exit nfs4_set_delegation without hashing the delegation, it will be
freed as soon as the callback is done with it, without ever being
removed from del_recall_lru.

Symptoms show up later as use-after-free or list corruption warnings,
usually in the laundromat thread.

I suspect aba2072f4523 "nfsd: grant read delegations to clients holding
writes" made this bug easier to hit, but I looked as far back as v3.0
and it looks to me it already had the same problem.  So I'm not sure
where the bug was introduced; it may have been there from the beginning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227497">SUSE bug 1227497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix nsfd startup race (again)

Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first")
has re-opened rpc_pipefs_event() race against nfsd_net_id registration
(register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76
("nfsd: fix nsfd startup race triggering BUG_ON").

Restore the order of register_pernet_subsys() vs register_cld_notifier().
Add WARN_ON() to prevent a future regression.

Crash info:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012
CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1
pc : rpc_pipefs_event+0x54/0x120 [nfsd]
lr : rpc_pipefs_event+0x48/0x120 [nfsd]
Call trace:
 rpc_pipefs_event+0x54/0x120 [nfsd]
 blocking_notifier_call_chain
 rpc_fill_super
 get_tree_keyed
 rpc_fs_get_tree
 vfs_get_tree
 do_mount
 ksys_mount
 __arm64_sys_mount
 el0_svc_handler
 el0_svc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47509</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: oss: Limit the period size to 16MB

Set the practical limit to the period size (the fragment shift in OSS)
instead of a full 31bit; a too large value could lead to the exhaust
of memory as we allocate temporary buffers of the period size, too.

As of this patch, we set to 16MB limit, which should cover all use
cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47510</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47510" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix re-dirty process of tree-log nodes

There is a report of a transaction abort of -EAGAIN with the following
script.

  #!/bin/sh

  for d in sda sdb; do
          mkfs.btrfs -d single -m single -f /dev/\${d}
  done

  mount /dev/sda /mnt/test
  mount /dev/sdb /mnt/scratch

  for dir in test scratch; do
          echo 3 &gt;/proc/sys/vm/drop_caches
          fio --directory=/mnt/\${dir} --name=fio.\${dir} --rw=read --size=50G --bs=64m \
                  --numjobs=$(nproc) --time_based --ramp_time=5 --runtime=480 \
                  --group_reporting |&amp; tee /dev/shm/fio.\${dir}
          echo 3 &gt;/proc/sys/vm/drop_caches
  done

  for d in sda sdb; do
          umount /dev/\${d}
  done

The stack trace is shown in below.

  [3310.967991] BTRFS: error (device sda) in btrfs_commit_transaction:2341: errno=-11 unknown (Error while writing out transaction)
  [3310.968060] BTRFS info (device sda): forced readonly
  [3310.968064] BTRFS warning (device sda): Skipping commit of aborted transaction.
  [3310.968065] ------------[ cut here ]------------
  [3310.968066] BTRFS: Transaction aborted (error -11)
  [3310.968074] WARNING: CPU: 14 PID: 1684 at fs/btrfs/transaction.c:1946 btrfs_commit_transaction.cold+0x209/0x2c8
  [3310.968131] CPU: 14 PID: 1684 Comm: fio Not tainted 5.14.10-300.fc35.x86_64 #1
  [3310.968135] Hardware name: DIAWAY Tartu/Tartu, BIOS V2.01.B10 04/08/2021
  [3310.968137] RIP: 0010:btrfs_commit_transaction.cold+0x209/0x2c8
  [3310.968144] RSP: 0018:ffffb284ce393e10 EFLAGS: 00010282
  [3310.968147] RAX: 0000000000000026 RBX: ffff973f147b0f60 RCX: 0000000000000027
  [3310.968149] RDX: ffff974ecf098a08 RSI: 0000000000000001 RDI: ffff974ecf098a00
  [3310.968150] RBP: ffff973f147b0f08 R08: 0000000000000000 R09: ffffb284ce393c48
  [3310.968151] R10: ffffb284ce393c40 R11: ffffffff84f47468 R12: ffff973f101bfc00
  [3310.968153] R13: ffff971f20cf2000 R14: 00000000fffffff5 R15: ffff973f147b0e58
  [3310.968154] FS:  00007efe65468740(0000) GS:ffff974ecf080000(0000) knlGS:0000000000000000
  [3310.968157] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [3310.968158] CR2: 000055691bcbe260 CR3: 000000105cfa4001 CR4: 0000000000770ee0
  [3310.968160] PKRU: 55555554
  [3310.968161] Call Trace:
  [3310.968167]  ? dput+0xd4/0x300
  [3310.968174]  btrfs_sync_file+0x3f1/0x490
  [3310.968180]  __x64_sys_fsync+0x33/0x60
  [3310.968185]  do_syscall_64+0x3b/0x90
  [3310.968190]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [3310.968194] RIP: 0033:0x7efe6557329b
  [3310.968200] RSP: 002b:00007ffe0236ebc0 EFLAGS: 00000293 ORIG_RAX: 000000000000004a
  [3310.968203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe6557329b
  [3310.968204] RDX: 0000000000000000 RSI: 00007efe58d77010 RDI: 0000000000000006
  [3310.968205] RBP: 0000000004000000 R08: 0000000000000000 R09: 00007efe58d77010
  [3310.968207] R10: 0000000016cacc0c R11: 0000000000000293 R12: 00007efe5ce95980
  [3310.968208] R13: 0000000000000000 R14: 00007efe6447c790 R15: 0000000c80000000
  [3310.968212] ---[ end trace 1a346f4d3c0d96ba ]---
  [3310.968214] BTRFS: error (device sda) in cleanup_transaction:1946: errno=-11 unknown

The abort occurs because of a write hole while writing out freeing tree
nodes of a tree-log tree. For zoned btrfs, we re-dirty a freed tree
node to ensure btrfs can write the region and does not leave a hole on
write on a zoned device. The current code fails to re-dirty a node
when the tree-log tree's depth is greater or equal to 2. That leads to
a transaction abort with -EAGAIN.

Fix the issue by properly re-dirtying a node on walking up the tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47511</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: oss: Fix negative period/buffer sizes

The period size calculation in OSS layer may receive a negative value
as an error, but the code there assumes only the positive values and
handle them with size_t.  Due to that, a too big value may be passed
to the lower layers.

This patch changes the code to handle with ssize_t and adds the proper
error checks appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227700">SUSE bug 1227700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47513" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering

Avoid a memory leak if there is not a CPU port defined.

Addresses-Coverity-ID: 1492897 ("Resource leak")
Addresses-Coverity-ID: 1492899 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47514</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47514" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: fix netns refcount leak in devlink_nl_cmd_reload()

While preparing my patch series adding netns refcount tracking,
I spotted bugs in devlink_nl_cmd_reload()

Some error paths forgot to release a refcount on a netns.

To fix this, we can reduce the scope of get_net()/put_net()
section around the call to devlink_reload().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47516</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: Fix memory leak in nfp_cpp_area_cache_add()

In line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a
CPP area structure. But in line 807 (#2), when the cache is allocated
failed, this CPP area structure is not freed, which will result in
memory leak.

We can fix it by freeing the CPP area when the cache is allocated
failed (#2).

792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)
793 {
794 	struct nfp_cpp_area_cache *cache;
795 	struct nfp_cpp_area *area;

800	area = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),
801 				  0, size);
	// #1: allocates and initializes

802 	if (!area)
803 		return -ENOMEM;

805 	cache = kzalloc(sizeof(*cache), GFP_KERNEL);
806 	if (!cache)
807 		return -ENOMEM; // #2: missing free

817	return 0;
818 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47518</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done

The done() netlink callback nfc_genl_dump_ses_done() should check if
received argument is non-NULL, because its allocation could fail earlier
in dumpit() (nfc_genl_dump_ses()).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47520" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: pch_can: pch_can_rx_normal: fix use after free

After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).

Reordering the lines solves the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227905">SUSE bug 1227905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47521" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: sja1000: fix use after free in ems_pcmcia_add_card()

If the last channel is not available then "dev" is freed.  Fortunately,
we can just use "pdev-&gt;irq" instead.

Also we should check if at least one channel was set up.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227696">SUSE bug 1227696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47522</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47522" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: bigbenff: prevent null pointer dereference

When emulating the device through uhid, there is a chance we don't have
output reports and so report_field is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47523</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47523" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr

This buffer is currently allocated in hfi1_init():

	if (reinit)
		ret = init_after_reset(dd);
	else
		ret = loadtime_init(dd);
	if (ret)
		goto done;

	/* allocate dummy tail memory for all receive contexts */
	dd-&gt;rcvhdrtail_dummy_kvaddr = dma_alloc_coherent(&amp;dd-&gt;pcidev-&gt;dev,
							 sizeof(u64),
							 &amp;dd-&gt;rcvhdrtail_dummy_dma,
							 GFP_KERNEL);

	if (!dd-&gt;rcvhdrtail_dummy_kvaddr) {
		dd_dev_err(dd, "cannot allocate dummy tail memory\n");
		ret = -ENOMEM;
		goto done;
	}

The reinit triggered path will overwrite the old allocation and leak it.

Fix by moving the allocation to hfi1_alloc_devdata() and the deallocation
to hfi1_free_devdata().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47524</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47524" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: fix minor-number leak on probe errors

Make sure to release the allocated minor number before returning on
probe errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47525</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47525" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: fix use-after-free and memleak on unbind

Deregister the port when unbinding the driver to prevent it from being
used after releasing the driver data and leaking memory allocated by
serial core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227697">SUSE bug 1227697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47526</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47526" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: Fix NULL pointer dereference in -&gt;remove()

drvdata has to be set in _probe() - otherwise platform_get_drvdata()
causes null pointer dereference BUG in _remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47528</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47528" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()

In cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep-&gt;ring
and there is a dereference of it in cdnsp_endpoint_init(), which could
lead to a NULL pointer dereference on failure of cdnsp_ring_alloc().

Fix this bug by adding a check of pep-&gt;ring.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_USB_CDNSP_GADGET=y show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47529</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47529" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: Fix memory leaks in error handling path

Should an error occur (invalid TLV len or memory allocation failure), the
memory already allocated in 'reduce_power_data' should be freed before
returning, otherwise it is leaking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47533</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47533" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Clear the HVS FIFO commit pointer once done

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a wait on the previous commit done on a given HVS
FIFO.

However, we never cleared that pointer once done. Since
drm_crtc_commit_put can free the drm_crtc_commit structure directly if
we were the last user, this means that it can lead to a use-after free
if we were to duplicate the state, and that stale pointer would even be
copied to the new state.

Set the pointer to NULL once we're done with the wait so that we don't
carry over a pointer to a free'd structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227498">SUSE bug 1227498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47534</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47534" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Add missing drm_crtc_commit_put

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a global state for the HVS, with each FIFO storing
the current CRTC commit so that we can properly synchronize commits.

However, the refcounting was off and we thus ended up leaking the
drm_crtc_commit structure every commit. Add a drm_crtc_commit_put to
prevent the leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Allocate enough space for GMU registers

In commit 142639a52a01 ("drm/msm/a6xx: fix crashstate capture for
A650") we changed a6xx_get_gmu_registers() to read 3 sets of
registers. Unfortunately, we didn't change the memory allocation for
the array. That leads to a KASAN warning (this was on the chromeos-5.4
kernel, which has the problematic commit backported to it):

  BUG: KASAN: slab-out-of-bounds in _a6xx_get_gmu_registers+0x144/0x430
  Write of size 8 at addr ffffff80c89432b0 by task A618-worker/209
  CPU: 5 PID: 209 Comm: A618-worker Tainted: G        W         5.4.156-lockdep #22
  Hardware name: Google Lazor Limozeen without Touchscreen (rev5 - rev8) (DT)
  Call trace:
   dump_backtrace+0x0/0x248
   show_stack+0x20/0x2c
   dump_stack+0x128/0x1ec
   print_address_description+0x88/0x4a0
   __kasan_report+0xfc/0x120
   kasan_report+0x10/0x18
   __asan_report_store8_noabort+0x1c/0x24
   _a6xx_get_gmu_registers+0x144/0x430
   a6xx_gpu_state_get+0x330/0x25d4
   msm_gpu_crashstate_capture+0xa0/0x84c
   recover_worker+0x328/0x838
   kthread_worker_fn+0x32c/0x574
   kthread+0x2dc/0x39c
   ret_from_fork+0x10/0x18

  Allocated by task 209:
   __kasan_kmalloc+0xfc/0x1c4
   kasan_kmalloc+0xc/0x14
   kmem_cache_alloc_trace+0x1f0/0x2a0
   a6xx_gpu_state_get+0x164/0x25d4
   msm_gpu_crashstate_capture+0xa0/0x84c
   recover_worker+0x328/0x838
   kthread_worker_fn+0x32c/0x574
   kthread+0x2dc/0x39c
   ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47536</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix wrong list_del in smc_lgr_cleanup_early

smc_lgr_cleanup_early() meant to delete the link
group from the link group list, but it deleted
the list head by mistake.

This may cause memory corruption since we didn't
remove the real link group from the list and later
memseted the link group structure.
We got a list corruption panic when testing:

[  231.277259] list_del corruption. prev-&gt;next should be ffff8881398a8000, but was 0000000000000000
[  231.278222] ------------[ cut here ]------------
[  231.278726] kernel BUG at lib/list_debug.c:53!
[  231.279326] invalid opcode: 0000 [#1] SMP NOPTI
[  231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435
[  231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014
[  231.281248] Workqueue: events smc_link_down_work
[  231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90
[  231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c
60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 &lt;0f&gt;
0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc
[  231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292
[  231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000
[  231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040
[  231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001
[  231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001
[  231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003
[  231.288337] FS:  0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
[  231.289160] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0
[  231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  231.291940] Call Trace:
[  231.292211]  smc_lgr_terminate_sched+0x53/0xa0
[  231.292677]  smc_switch_conns+0x75/0x6b0
[  231.293085]  ? update_load_avg+0x1a6/0x590
[  231.293517]  ? ttwu_do_wakeup+0x17/0x150
[  231.293907]  ? update_load_avg+0x1a6/0x590
[  231.294317]  ? newidle_balance+0xca/0x3d0
[  231.294716]  smcr_link_down+0x50/0x1a0
[  231.295090]  ? __wake_up_common_lock+0x77/0x90
[  231.295534]  smc_link_down_work+0x46/0x60
[  231.295933]  process_one_work+0x18b/0x350
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47537</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Fix a memleak bug in rvu_mbox_init()

In rvu_mbox_init(), mbox_regions is not freed or passed out
under the switch-default region, which could lead to a memory leak.

Fix this bug by changing 'return err' to 'goto free_regions'.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_OCTEONTX2_AF=y show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47540</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47540" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode

Fix the following NULL pointer dereference in mt7915_get_phy_mode
routine adding an ibss interface to the mt7915 driver.

[  101.137097] wlan0: Trigger new scan to find an IBSS to join
[  102.827039] wlan0: Creating new IBSS network, BSSID 26:a4:50:1a:6e:69
[  103.064756] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  103.073670] Mem abort info:
[  103.076520]   ESR = 0x96000005
[  103.079614]   EC = 0x25: DABT (current EL), IL = 32 bits
[  103.084934]   SET = 0, FnV = 0
[  103.088042]   EA = 0, S1PTW = 0
[  103.091215] Data abort info:
[  103.094104]   ISV = 0, ISS = 0x00000005
[  103.098041]   CM = 0, WnR = 0
[  103.101044] user pgtable: 4k pages, 39-bit VAs, pgdp=00000000460b1000
[  103.107565] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[  103.116590] Internal error: Oops: 96000005 [#1] SMP
[  103.189066] CPU: 1 PID: 333 Comm: kworker/u4:3 Not tainted 5.10.75 #0
[  103.195498] Hardware name: MediaTek MT7622 RFB1 board (DT)
[  103.201124] Workqueue: phy0 ieee80211_iface_work [mac80211]
[  103.206695] pstate: 20000005 (nzCv daif -PAN -UAO -TCO BTYPE=--)
[  103.212705] pc : mt7915_get_phy_mode+0x68/0x120 [mt7915e]
[  103.218103] lr : mt7915_mcu_add_bss_info+0x11c/0x760 [mt7915e]
[  103.223927] sp : ffffffc011cdb9e0
[  103.227235] x29: ffffffc011cdb9e0 x28: ffffff8006563098
[  103.232545] x27: ffffff8005f4da22 x26: ffffff800685ac40
[  103.237855] x25: 0000000000000001 x24: 000000000000011f
[  103.243165] x23: ffffff8005f4e260 x22: ffffff8006567918
[  103.248475] x21: ffffff8005f4df80 x20: ffffff800685ac58
[  103.253785] x19: ffffff8006744400 x18: 0000000000000000
[  103.259094] x17: 0000000000000000 x16: 0000000000000001
[  103.264403] x15: 000899c3a2d9d2e4 x14: 000899bdc3c3a1c8
[  103.269713] x13: 0000000000000000 x12: 0000000000000000
[  103.275024] x11: ffffffc010e30c20 x10: 0000000000000000
[  103.280333] x9 : 0000000000000050 x8 : ffffff8006567d88
[  103.285642] x7 : ffffff8006563b5c x6 : ffffff8006563b44
[  103.290952] x5 : 0000000000000002 x4 : 0000000000000001
[  103.296262] x3 : 0000000000000001 x2 : 0000000000000001
[  103.301572] x1 : 0000000000000000 x0 : 0000000000000011
[  103.306882] Call trace:
[  103.309328]  mt7915_get_phy_mode+0x68/0x120 [mt7915e]
[  103.314378]  mt7915_bss_info_changed+0x198/0x200 [mt7915e]
[  103.319941]  ieee80211_bss_info_change_notify+0x128/0x290 [mac80211]
[  103.326360]  __ieee80211_sta_join_ibss+0x308/0x6c4 [mac80211]
[  103.332171]  ieee80211_sta_create_ibss+0x8c/0x10c [mac80211]
[  103.337895]  ieee80211_ibss_work+0x3dc/0x614 [mac80211]
[  103.343185]  ieee80211_iface_work+0x388/0x3f0 [mac80211]
[  103.348495]  process_one_work+0x288/0x690
[  103.352499]  worker_thread+0x70/0x464
[  103.356157]  kthread+0x144/0x150
[  103.359380]  ret_from_fork+0x10/0x18
[  103.362952] Code: 394008c3 52800220 394000e4 7100007f (39400023)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47541</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()

In mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and
tmp-&gt;tx_cq will be freed on the error path of mlx4_en_copy_priv().
After that mlx4_en_alloc_resources() is called and there is a dereference
of &amp;tmp-&gt;tx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to
a use after free problem on failure of mlx4_en_copy_priv().

Fix this bug by adding a check of mlx4_en_copy_priv()

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_MLX4_EN=m show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225454">SUSE bug 1225454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47542</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()

In qlcnic_83xx_add_rings(), the indirect function of
ahw-&gt;hw_ops-&gt;alloc_mbx_args will be called to allocate memory for
cmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),
which could lead to a NULL pointer dereference on failure of the
indirect function like qlcnic_83xx_alloc_mbx_args().

Fix this bug by adding a check of alloc_mbx_args(), this patch
imitates the logic of mbx_cmd()'s failure handling.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_QLCNIC=m show no new warnings, and our
static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47544</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47544" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix page frag corruption on page fault

Steffen reported a TCP stream corruption for HTTP requests
served by the apache web-server using a cifs mount-point
and memory mapping the relevant file.

The root cause is quite similar to the one addressed by
commit 20eb4f29b602 ("net: fix sk_page_frag() recursion from
memory reclaim"). Here the nested access to the task page frag
is caused by a page fault on the (mmapped) user-space memory
buffer coming from the cifs file.

The page fault handler performs an smb transaction on a different
socket, inside the same process context. Since sk-&gt;sk_allaction
for such socket does not prevent the usage for the task_frag,
the nested allocation modify "under the hood" the page frag
in use by the outer sendmsg call, corrupting the stream.

The overall relevant stack trace looks like the following:

httpd 78268 [001] 3461630.850950:      probe:tcp_sendmsg_locked:
        ffffffff91461d91 tcp_sendmsg_locked+0x1
        ffffffff91462b57 tcp_sendmsg+0x27
        ffffffff9139814e sock_sendmsg+0x3e
        ffffffffc06dfe1d smb_send_kvec+0x28
        [...]
        ffffffffc06cfaf8 cifs_readpages+0x213
        ffffffff90e83c4b read_pages+0x6b
        ffffffff90e83f31 __do_page_cache_readahead+0x1c1
        ffffffff90e79e98 filemap_fault+0x788
        ffffffff90eb0458 __do_fault+0x38
        ffffffff90eb5280 do_fault+0x1a0
        ffffffff90eb7c84 __handle_mm_fault+0x4d4
        ffffffff90eb8093 handle_mm_fault+0xc3
        ffffffff90c74f6d __do_page_fault+0x1ed
        ffffffff90c75277 do_page_fault+0x37
        ffffffff9160111e page_fault+0x1e
        ffffffff9109e7b5 copyin+0x25
        ffffffff9109eb40 _copy_from_iter_full+0xe0
        ffffffff91462370 tcp_sendmsg_locked+0x5e0
        ffffffff91462370 tcp_sendmsg_locked+0x5e0
        ffffffff91462b57 tcp_sendmsg+0x27
        ffffffff9139815c sock_sendmsg+0x4c
        ffffffff913981f7 sock_write_iter+0x97
        ffffffff90f2cc56 do_iter_readv_writev+0x156
        ffffffff90f2dff0 do_iter_write+0x80
        ffffffff90f2e1c3 vfs_writev+0xa3
        ffffffff90f2e27c do_writev+0x5c
        ffffffff90c042bb do_syscall_64+0x5b
        ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65

The cifs filesystem rightfully sets sk_allocations to GFP_NOFS,
we can avoid the nesting using the sk page frag for allocation
lacking the __GFP_FS flag. Do not define an additional mm-helper
for that, as this is strictly tied to the sk page frag usage.

v1 -&gt; v2:
 - use a stricted sk_page_frag() check instead of reordering the
   code (Eric)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47549</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47549" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl

When the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux,
a bug is reported:
 ==================================================================
 BUG: Unable to handle kernel data access on read at 0x80000800805b502c
 Oops: Kernel access of bad area, sig: 11 [#1]
 NIP [c0000000000388a4] .ioread32+0x4/0x20
 LR [80000000000c6034] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl]
 Call Trace:
  .free_irq+0x1c/0x4e0 (unreliable)
  .ata_host_stop+0x74/0xd0 [libata]
  .release_nodes+0x330/0x3f0
  .device_release_driver_internal+0x178/0x2c0
  .driver_detach+0x64/0xd0
  .bus_remove_driver+0x70/0xf0
  .driver_unregister+0x38/0x80
  .platform_driver_unregister+0x14/0x30
  .fsl_sata_driver_exit+0x18/0xa20 [sata_fsl]
  .__se_sys_delete_module+0x1ec/0x2d0
  .system_call_exception+0xfc/0x1f0
  system_call_common+0xf8/0x200
 ==================================================================

The triggering of the BUG is shown in the following stack:

driver_detach
  device_release_driver_internal
    __device_release_driver
      drv-&gt;remove(dev) --&gt; platform_drv_remove/platform_remove
        drv-&gt;remove(dev) --&gt; sata_fsl_remove
          iounmap(host_priv-&gt;hcr_base);			&lt;---- unmap
          kfree(host_priv);                             &lt;---- free
      devres_release_all
        release_nodes
          dr-&gt;node.release(dev, dr-&gt;data) --&gt; ata_host_stop
            ap-&gt;ops-&gt;port_stop(ap) --&gt; sata_fsl_port_stop
                ioread32(hcr_base + HCONTROL)           &lt;---- UAF
            host-&gt;ops-&gt;host_stop(host)

The iounmap(host_priv-&gt;hcr_base) and kfree(host_priv) functions should
not be executed in drv-&gt;remove. These functions should be executed in
host_stop after port_stop. Therefore, we move these functions to the
new function sata_fsl_host_stop and bind the new function to host_stop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227654">SUSE bug 1227654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47550</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: fix potential memleak

In function amdgpu_get_xgmi_hive, when kobject_init_and_add failed
There is a potential memleak if not call kobject_put.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47551</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47551" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again

In SRIOV configuration, the reset may failed to bring asic back to normal but stop cpsch
already been called, the start_cpsch will not be called since there is no resume in this
case.  When reset been triggered again, driver should avoid to do uninitialization again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47553</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47553" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/scs: Reset task stack state in bringup_cpu()

To hot unplug a CPU, the idle task on that CPU calls a few layers of C
code before finally leaving the kernel. When KASAN is in use, poisoned
shadow is left around for each of the active stack frames, and when
shadow call stacks are in use. When shadow call stacks (SCS) are in use
the task's saved SCS SP is left pointing at an arbitrary point within
the task's shadow call stack.

When a CPU is offlined than onlined back into the kernel, this stale
state can adversely affect execution. Stale KASAN shadow can alias new
stackframes and result in bogus KASAN warnings. A stale SCS SP is
effectively a memory leak, and prevents a portion of the shadow call
stack being used. Across a number of hotplug cycles the idle task's
entire shadow call stack can become unusable.

We previously fixed the KASAN issue in commit:

  e1b77c92981a5222 ("sched/kasan: remove stale KASAN poison after hotplug")

... by removing any stale KASAN stack poison immediately prior to
onlining a CPU.

Subsequently in commit:

  f1a0a376ca0c4ef1 ("sched/core: Initialize the idle task with preemption disabled")

... the refactoring left the KASAN and SCS cleanup in one-time idle
thread initialization code rather than something invoked prior to each
CPU being onlined, breaking both as above.

We fixed SCS (but not KASAN) in commit:

  63acd42c0d4942f7 ("sched/scs: Reset the shadow stack when idle_task_exit")

... but as this runs in the context of the idle task being offlined it's
potentially fragile.

To fix these consistently and more robustly, reset the SCS SP and KASAN
shadow of a CPU's idle task immediately before we online that CPU in
bringup_cpu(). This ensures the idle task always has a consistent state
when it is running, and removes the need to so so when exiting an idle
task.

Whenever any thread is created, dup_task_struct() will give the task a
stack which is free of KASAN shadow, and initialize the task's SCS SP,
so there's no need to specially initialize either for idle thread within
init_idle(), as this was only necessary to handle hotplug cycles.

I've tested this on arm64 with:

* gcc 11.1.0, defconfig +KASAN_INLINE, KASAN_STACK
* clang 12.0.0, defconfig +KASAN_INLINE, KASAN_STACK, SHADOW_CALL_STACK

... offlining and onlining CPUS with:

| while true; do
|   for C in /sys/devices/system/cpu/cpu*/online; do
|     echo 0 &gt; $C;
|     echo 1 &gt; $C;
|   done
| done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227558">SUSE bug 1227558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47554</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47554" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim: avoid putting an uninitialized iova_domain

The system will crash if we put an uninitialized iova_domain, this
could happen when an error occurs before initializing the iova_domain
in vdpasim_create().

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
RIP: 0010:__cpuhp_state_remove_instance+0x96/0x1c0
...
Call Trace:
 &lt;TASK&gt;
 put_iova_domain+0x29/0x220
 vdpasim_free+0xd1/0x120 [vdpa_sim]
 vdpa_release_dev+0x21/0x40 [vdpa]
 device_release+0x33/0x90
 kobject_release+0x63/0x160
 vdpasim_create+0x127/0x2a0 [vdpa_sim]
 vdpasim_net_dev_add+0x7d/0xfe [vdpa_sim_net]
 vdpa_nl_cmd_dev_add_set_doit+0xe1/0x1a0 [vdpa]
 genl_family_rcv_msg_doit+0x112/0x140
 genl_rcv_msg+0xdf/0x1d0
 ...

So we must make sure the iova_domain is already initialized before
put it.

In addition, we may get the following warning in this case:
WARNING: ... drivers/iommu/iova.c:344 iova_cache_put+0x58/0x70

So we must make sure the iova_cache_put() is invoked only if the
iova_cache_get() is already invoked. Let's fix it together.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47556</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()

ethtool_set_coalesce() now uses both the .get_coalesce() and
.set_coalesce() callbacks. But the check for their availability is
buggy, so changing the coalesce settings on a device where the driver
provides only _one_ of the callbacks results in a NULL pointer
dereference instead of an -EOPNOTSUPP.

Fix the condition so that the availability of both callbacks is
ensured. This also matches the netlink code.

Note that reproducing this requires some effort - it only affects the
legacy ioctl path, and needs a specific combination of driver options:
- have .get_coalesce() and .coalesce_supported but no
 .set_coalesce(), or
- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn't
  cause the crash as it first attempts to call ethtool_get_coalesce()
  and bails out on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47558</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47558" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Disable Tx queues when reconfiguring the interface

The Tx queues were not disabled in situations where the driver needed to
stop the interface to apply a new configuration. This could result in a
kernel panic when doing any of the 3 following actions:
* reconfiguring the number of queues (ethtool -L)
* reconfiguring the size of the ring buffers (ethtool -G)
* installing/removing an XDP program (ip l set dev ethX xdp)

Prevent the panic by making sure netif_tx_disable is called when stopping
an interface.

Without this patch, the following kernel panic can be observed when doing
any of the actions above:

Unable to handle kernel paging request at virtual address ffff80001238d040
[....]
 Call trace:
  dwmac4_set_addr+0x8/0x10
  dev_hard_start_xmit+0xe4/0x1ac
  sch_direct_xmit+0xe8/0x39c
  __dev_queue_xmit+0x3ec/0xaf0
  dev_queue_xmit+0x14/0x20
[...]
[ end trace 0000000000000002 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()

Coverity reports a possible NULL dereferencing problem:

in smc_vlan_by_tcpsk():
6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).
7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.
1623                ndev = (struct net_device *)netdev_lower_get_next(ndev, &amp;lower);
CID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)
8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.
1624                if (is_vlan_dev(ndev)) {

Remove the manual implementation and use netdev_walk_all_lower_dev() to
iterate over the lower devices. While on it remove an obsolete function
parameter comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47560</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum: Protect driver from buggy firmware

When processing port up/down events generated by the device's firmware,
the driver protects itself from events reported for non-existent local
ports, but not the CPU port (local port 0), which exists, but lacks a
netdev.

This can result in a NULL pointer dereference when calling
netif_carrier_{on,off}().

Fix this by bailing early when processing an event reported for the CPU
port. Problem was only observed when running on top of a buggy emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47562</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47562" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix vsi-&gt;txq_map sizing

The approach of having XDP queue per CPU regardless of user's setting
exposed a hidden bug that could occur in case when Rx queue count differ
from Tx queue count. Currently vsi-&gt;txq_map's size is equal to the
doubled vsi-&gt;alloc_txq, which is not correct due to the fact that XDP
rings were previously based on the Rx queue count. Below splat can be
seen when ethtool -L is used and XDP rings are configured:

[  682.875339] BUG: kernel NULL pointer dereference, address: 000000000000000f
[  682.883403] #PF: supervisor read access in kernel mode
[  682.889345] #PF: error_code(0x0000) - not-present page
[  682.895289] PGD 0 P4D 0
[  682.898218] Oops: 0000 [#1] PREEMPT SMP PTI
[  682.903055] CPU: 42 PID: 2878 Comm: ethtool Tainted: G           OE     5.15.0-rc5+ #1
[  682.912214] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016
[  682.923380] RIP: 0010:devres_remove+0x44/0x130
[  682.928527] Code: 49 89 f4 55 48 89 fd 4c 89 ff 53 48 83 ec 10 e8 92 b9 49 00 48 8b 9d a8 02 00 00 48 8d 8d a0 02 00 00 49 89 c2 48 39 cb 74 0f &lt;4c&gt; 3b 63 10 74 25 48 8b 5b 08 48 39 cb 75 f1 4c 89 ff 4c 89 d6 e8
[  682.950237] RSP: 0018:ffffc90006a679f0 EFLAGS: 00010002
[  682.956285] RAX: 0000000000000286 RBX: ffffffffffffffff RCX: ffff88908343a370
[  682.964538] RDX: 0000000000000001 RSI: ffffffff81690d60 RDI: 0000000000000000
[  682.972789] RBP: ffff88908343a0d0 R08: 0000000000000000 R09: 0000000000000000
[  682.981040] R10: 0000000000000286 R11: 3fffffffffffffff R12: ffffffff81690d60
[  682.989282] R13: ffffffff81690a00 R14: ffff8890819807a8 R15: ffff88908343a36c
[  682.997535] FS:  00007f08c7bfa740(0000) GS:ffff88a03fd00000(0000) knlGS:0000000000000000
[  683.006910] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  683.013557] CR2: 000000000000000f CR3: 0000001080a66003 CR4: 00000000003706e0
[  683.021819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  683.030075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  683.038336] Call Trace:
[  683.041167]  devm_kfree+0x33/0x50
[  683.045004]  ice_vsi_free_arrays+0x5e/0xc0 [ice]
[  683.050380]  ice_vsi_rebuild+0x4c8/0x750 [ice]
[  683.055543]  ice_vsi_recfg_qs+0x9a/0x110 [ice]
[  683.060697]  ice_set_channels+0x14f/0x290 [ice]
[  683.065962]  ethnl_set_channels+0x333/0x3f0
[  683.070807]  genl_family_rcv_msg_doit+0xea/0x150
[  683.076152]  genl_rcv_msg+0xde/0x1d0
[  683.080289]  ? channels_prepare_data+0x60/0x60
[  683.085432]  ? genl_get_cmd+0xd0/0xd0
[  683.089667]  netlink_rcv_skb+0x50/0xf0
[  683.094006]  genl_rcv+0x24/0x40
[  683.097638]  netlink_unicast+0x239/0x340
[  683.102177]  netlink_sendmsg+0x22e/0x470
[  683.106717]  sock_sendmsg+0x5e/0x60
[  683.110756]  __sys_sendto+0xee/0x150
[  683.114894]  ? handle_mm_fault+0xd0/0x2a0
[  683.119535]  ? do_user_addr_fault+0x1f3/0x690
[  683.134173]  __x64_sys_sendto+0x25/0x30
[  683.148231]  do_syscall_64+0x3b/0xc0
[  683.161992]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Fix this by taking into account the value that num_possible_cpus()
yields in addition to vsi-&gt;alloc_txq instead of doubling the latter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47563</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47563" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: avoid bpf_prog refcount underflow

Ice driver has the routines for managing XDP resources that are shared
between ndo_bpf op and VSI rebuild flow. The latter takes place for
example when user changes queue count on an interface via ethtool's
set_channels().

There is an issue around the bpf_prog refcounting when VSI is being
rebuilt - since ice_prepare_xdp_rings() is called with vsi-&gt;xdp_prog as
an argument that is used later on by ice_vsi_assign_bpf_prog(), same
bpf_prog pointers are swapped with each other. Then it is also
interpreted as an 'old_prog' which in turn causes us to call
bpf_prog_put on it that will decrement its refcount.

Below splat can be interpreted in a way that due to zero refcount of a
bpf_prog it is wiped out from the system while kernel still tries to
refer to it:

[  481.069429] BUG: unable to handle page fault for address: ffffc9000640f038
[  481.077390] #PF: supervisor read access in kernel mode
[  481.083335] #PF: error_code(0x0000) - not-present page
[  481.089276] PGD 100000067 P4D 100000067 PUD 1001cb067 PMD 106d2b067 PTE 0
[  481.097141] Oops: 0000 [#1] PREEMPT SMP PTI
[  481.101980] CPU: 12 PID: 3339 Comm: sudo Tainted: G           OE     5.15.0-rc5+ #1
[  481.110840] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016
[  481.122021] RIP: 0010:dev_xdp_prog_id+0x25/0x40
[  481.127265] Code: 80 00 00 00 00 0f 1f 44 00 00 89 f6 48 c1 e6 04 48 01 fe 48 8b 86 98 08 00 00 48 85 c0 74 13 48 8b 50 18 31 c0 48 85 d2 74 07 &lt;48&gt; 8b 42 38 8b 40 20 c3 48 8b 96 90 08 00 00 eb e8 66 2e 0f 1f 84
[  481.148991] RSP: 0018:ffffc90007b63868 EFLAGS: 00010286
[  481.155034] RAX: 0000000000000000 RBX: ffff889080824000 RCX: 0000000000000000
[  481.163278] RDX: ffffc9000640f000 RSI: ffff889080824010 RDI: ffff889080824000
[  481.171527] RBP: ffff888107af7d00 R08: 0000000000000000 R09: ffff88810db5f6e0
[  481.179776] R10: 0000000000000000 R11: ffff8890885b9988 R12: ffff88810db5f4bc
[  481.188026] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  481.196276] FS:  00007f5466d5bec0(0000) GS:ffff88903fb00000(0000) knlGS:0000000000000000
[  481.205633] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  481.212279] CR2: ffffc9000640f038 CR3: 000000014429c006 CR4: 00000000003706e0
[  481.220530] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  481.228771] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  481.237029] Call Trace:
[  481.239856]  rtnl_fill_ifinfo+0x768/0x12e0
[  481.244602]  rtnl_dump_ifinfo+0x525/0x650
[  481.249246]  ? __alloc_skb+0xa5/0x280
[  481.253484]  netlink_dump+0x168/0x3c0
[  481.257725]  netlink_recvmsg+0x21e/0x3e0
[  481.262263]  ____sys_recvmsg+0x87/0x170
[  481.266707]  ? __might_fault+0x20/0x30
[  481.271046]  ? _copy_from_user+0x66/0xa0
[  481.275591]  ? iovec_from_user+0xf6/0x1c0
[  481.280226]  ___sys_recvmsg+0x82/0x100
[  481.284566]  ? sock_sendmsg+0x5e/0x60
[  481.288791]  ? __sys_sendto+0xee/0x150
[  481.293129]  __sys_recvmsg+0x56/0xa0
[  481.297267]  do_syscall_64+0x3b/0xc0
[  481.301395]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  481.307238] RIP: 0033:0x7f5466f39617
[  481.311373] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb bd 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2f 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[  481.342944] RSP: 002b:00007ffedc7f4308 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[  481.361783] RAX: ffffffffffffffda RBX: 00007ffedc7f5460 RCX: 00007f5466f39617
[  481.380278] RDX: 0000000000000000 RSI: 00007ffedc7f5360 RDI: 0000000000000003
[  481.398500] RBP: 00007ffedc7f53f0 R08: 0000000000000000 R09: 000055d556f04d50
[  481.416463] R10: 0000000000000077 R11: 0000000000000246 R12: 00007ffedc7f5360
[  481.434131] R13: 00007ffedc7f5350 R14: 00007ffedc7f5344 R15: 0000000000000e98
[  481.451520] Modules linked in: ice
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227695">SUSE bug 1227695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix double free issue on err path

fix error path handling in prestera_bridge_port_join() that
cases prestera driver to crash (see below).

 Trace:
   Internal error: Oops: 96000044 [#1] SMP
   Modules linked in: prestera_pci prestera uio_pdrv_genirq
   CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1
   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
   pc : prestera_bridge_destroy+0x2c/0xb0 [prestera]
   lr : prestera_bridge_port_join+0x2cc/0x350 [prestera]
   sp : ffff800011a1b0f0
   ...
   x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122
    Call trace:
   prestera_bridge_destroy+0x2c/0xb0 [prestera]
   prestera_bridge_port_join+0x2cc/0x350 [prestera]
   prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera]
   prestera_netdev_event_handler+0xf4/0x110 [prestera]
   raw_notifier_call_chain+0x54/0x80
   call_netdevice_notifiers_info+0x54/0xa0
   __netdev_upper_dev_link+0x19c/0x380
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47565</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix kernel panic during drive powercycle test

While looping over shost's sdev list it is possible that one
of the drives is getting removed and its sas_target object is
freed but its sdev object remains intact.

Consequently, a kernel panic can occur while the driver is trying to access
the sas_address field of sas_target object without also checking the
sas_target object for NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0670" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0670" ref_url="https://www.suse.com/security/cve/CVE-2022-0670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028377.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality and Integrity of a file system. Fixed in RHCS 5.2 and Ceph 17.2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0670/">CVE-2022-0670 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0670">CVE-2022-0670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201837">SUSE bug 1201837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750864" comment="librados2-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750865" comment="librbd1-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1210</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1210" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2379-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035886.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-26"/>
	<updated date="2024-07-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198146">SUSE bug 1198146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817821" comment="libjbig2-2.1-150000.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151938" comment="libjbig2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1622" ref_url="https://www.suse.com/security/cve/CVE-2022-1622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1622/">CVE-2022-1622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1622">CVE-2022-1622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199483">SUSE bug 1199483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1996</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1996" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2002-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HVVWQ7QWDT7GBZUAYXIWYZURAWKCEVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFXT5GO737TPBRXIUOZS7A3WOJKWSJAX/" source="SUSE-SU"/>
    <description>
    Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-12-17"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813859" comment="containerd-1.7.8-150000.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813861" comment="runc-1.1.10-150000.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20154">CVE-2022-20154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200599">SUSE bug 1200599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200608">SUSE bug 1200608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2127</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015957.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213174">SUSE bug 1213174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772450" comment="samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772451" comment="samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2196</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23820</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23820" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Failure to validate the AMD SMM communication buffer
may allow an attacker to corrupt the SMRAM potentially leading to arbitrary
code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217557">SUSE bug 1217557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220057">SUSE bug 1220057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220058">SUSE bug 1220058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221588">SUSE bug 1221588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23830" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23830" ref_url="https://www.suse.com/security/cve/CVE-2022-23830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23830/">CVE-2022-23830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23830">CVE-2022-23830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="TID000020668" ref_url="https://www.suse.com/support/kb/doc/?id=000020668" source="SUSE-SU"/>
    <description>
    There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205065">SUSE bug 1205065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205066">SUSE bug 1205066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205831">SUSE bug 1205831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33972</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33972" ref_url="https://www.suse.com/security/cve/CVE-2022-33972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014958.html" source="SUSE-SU"/>
    <description>
    Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-33972/">CVE-2022-33972 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33972">CVE-2022-33972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208479">SUSE bug 1208479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009758961" comment="ucode-intel-20230512-150200.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3555</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0668-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029045.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743224" comment="libX11-6-1.6.5-150000.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743063" comment="libX11-data-1.6.5-150000.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743225" comment="libX11-xcb1-1.6.5-150000.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36109</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36109" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36109" ref_url="https://www.suse.com/security/cve/CVE-2022-36109" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0795-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028425.html" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.  This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36109/">CVE-2022-36109 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205375">SUSE bug 1205375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744035" comment="docker-20.10.23_ce-150000.175.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3650</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3650" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3650" ref_url="https://www.suse.com/security/cve/CVE-2022-3650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028377.html" source="SUSE-SU"/>
    <description>
    A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, and dump privileged information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3650/">CVE-2022-3650 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3650">CVE-2022-3650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204430">SUSE bug 1204430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750864" comment="librados2-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750865" comment="librbd1-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3854" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3854" ref_url="https://www.suse.com/security/cve/CVE-2022-3854" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028377.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3854/">CVE-2022-3854 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3854">CVE-2022-3854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205025">SUSE bug 1205025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750864" comment="librados2-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154240" comment="librados2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009750865" comment="librbd1-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154244" comment="librbd1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40090" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214680">SUSE bug 1214680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036524.html" source="SUSE-SU"/>
    <description>
    Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810448" comment="python3-setuptools-44.1.1-150400.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303048" comment="python3-setuptools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="TID000021170" ref_url="https://www.suse.com/support/kb/doc/?id=000021170" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778161" comment="ucode-intel-20230808-150200.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778685" comment="xen-libs-4.16.5_02-150400.4.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41409</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41409" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41409" ref_url="https://www.suse.com/security/cve/CVE-2022-41409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3327-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3328-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031020.html" source="SUSE-SU"/>
    <description>
    Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41409/">CVE-2022-41409 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41409">CVE-2022-41409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213514">SUSE bug 1213514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774220" comment="libpcre2-8-0-10.39-150400.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153653" comment="libpcre2-8-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
    <description>
    Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214099">SUSE bug 1214099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215580">SUSE bug 1215580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778161" comment="ucode-intel-20230808-150200.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42331</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42331" ref_url="https://www.suse.com/security/cve/CVE-2022-42331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42331/">CVE-2022-42331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42331">CVE-2022-42331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209019">SUSE bug 1209019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747893" comment="xen-libs-4.16.3_06-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42332</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42332" ref_url="https://www.suse.com/security/cve/CVE-2022-42332" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tables as well as auxiliary data structures. To migrate or snapshot guests, Xen additionally runs them in so called log-dirty mode. The data structures needed by the log-dirty tracking are part of aformentioned auxiliary data. In order to keep error handling efforts within reasonable bounds, for operations which may require memory allocations shadow mode logic ensures up front that enough memory is available for the worst case requirements. Unfortunately, while page table memory is properly accounted for on the code path requiring the potential establishing of new shadows, demands by the log-dirty infrastructure were not taken into consideration. As a result, just established shadow page tables could be freed again immediately, while other code is still accessing them on the assumption that they would remain allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42332/">CVE-2022-42332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42332">CVE-2022-42332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209017">SUSE bug 1209017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747893" comment="xen-libs-4.16.3_06-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42333</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42333" ref_url="https://www.suse.com/security/cve/CVE-2022-42333" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42333/">CVE-2022-42333 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42333">CVE-2022-42333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209018">SUSE bug 1209018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747893" comment="xen-libs-4.16.3_06-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42334</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42334" ref_url="https://www.suse.com/security/cve/CVE-2022-42334" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014116.html" source="SUSE-SU"/>
    <description>
    x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42334/">CVE-2022-42334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42334">CVE-2022-42334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209018">SUSE bug 1209018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747893" comment="xen-libs-4.16.3_06-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4269</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4304</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:29171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015773.html" source="SUSE-SU"/>
    <description>
    A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.

For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210067">SUSE bug 1210067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213289">SUSE bug 1213289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215014">SUSE bug 1215014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009768420" comment="libopenssl-1_1-devel-1.1.1l-150400.7.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009768421" comment="libopenssl1_1-1.1.1l-150400.7.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009768422" comment="libopenssl1_1-hmac-1.1.1l-150400.7.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009768423" comment="openssl-1_1-1.1.1l-150400.7.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3822-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016735.html" source="SUSE-SU"/>
    <description>
    A Cleartext Storage of Sensitive Information vulnerability in suppportutils of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 15 SP3 allows attackers that get access to the support logs to gain knowledge of the stored credentials This issue affects: SUSE Linux Enterprise Server 12 supportutils version 3.0.10-95.51.1CWE-312: Cleartext Storage of Sensitive Information and prior versions. SUSE Linux Enterprise Server 15 supportutils version 3.1.21-150000.5.44.1 and prior versions. SUSE Linux Enterprise Server 15 SP3 supportutils version 3.1.21-150300.7.35.15.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207598">SUSE bug 1207598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781703" comment="supportutils-3.1.26-150300.7.35.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245545" comment="supportutils is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45885</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45886</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45887</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208912">SUSE bug 1208912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20224603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4603" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035885.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-23"/>
	<updated date="2024-07-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218251">SUSE bug 1218251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817822" comment="ppp-2.4.7-150000.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152115" comment="ppp is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    A double-free flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209672">SUSE bug 1209672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851284" comment="libpython3_6m1_0-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851285" comment="python3-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851286" comment="python3-base-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2077-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035954.html" source="SUSE-SU"/>
    <description>
    In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219276">SUSE bug 1219276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220293">SUSE bug 1220293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868392" comment="gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868393" comment="libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868394" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48624</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034922.html" source="SUSE-SU"/>
    <description>
    close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219901">SUSE bug 1219901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223303">SUSE bug 1223303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224875">SUSE bug 1224875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854018" comment="less-590-150400.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177208" comment="less is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48626</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

moxart: fix potential use-after-free on remove path

It was reported that the mmc host structure could be accessed after it
was freed in moxart_remove(), so fix this by saving the base register of
the device and using it instead of the pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48627</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix memory overlapping when deleting chars in the buffer

A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.

Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qcom-rng - ensure buffer for generate is completely filled

The generate function in struct rng_alg expects that the destination
buffer is completely filled if the function returns 0. qcom_rng_read()
can run into a situation where the buffer is partially filled with
randomness and the remaining part of the buffer is zeroed since
qcom_rng_generate() doesn't check the return value. This issue can
be reproduced by running the following from libkcapi:

    kcapi-rng -b 9000000 &gt; OUTFILE

The generated OUTFILE will have three huge sections that contain all
zeros, and this is caused by the code where the test
'val &amp; PRNG_STATUS_DATA_AVAIL' fails.

Let's fix this issue by ensuring that qcom_rng_read() always returns
with a full buffer if the function returns success. Let's also have
qcom_rng_generate() return the correct value.

Here's some statistics from the ent project
(https://www.fourmilab.ch/random/) that shows information about the
quality of the generated numbers:

    $ ent -c qcom-random-before
    Value Char Occurrences Fraction
      0           606748   0.067416
      1            33104   0.003678
      2            33001   0.003667
    ...
    253   �        32883   0.003654
    254   �        33035   0.003671
    255   �        33239   0.003693

    Total:       9000000   1.000000

    Entropy = 7.811590 bits per byte.

    Optimum compression would reduce the size
    of this 9000000 byte file by 2 percent.

    Chi square distribution for 9000000 samples is 9329962.81, and
    randomly would exceed this value less than 0.01 percent of the
    times.

    Arithmetic mean value of data bytes is 119.3731 (127.5 = random).
    Monte Carlo value for Pi is 3.197293333 (error 1.77 percent).
    Serial correlation coefficient is 0.159130 (totally uncorrelated =
    0.0).

Without this patch, the results of the chi-square test is 0.01%, and
the numbers are certainly not random according to ent's project page.
The results improve with this patch:

    $ ent -c qcom-random-after
    Value Char Occurrences Fraction
      0            35432   0.003937
      1            35127   0.003903
      2            35424   0.003936
    ...
    253   �        35201   0.003911
    254   �        34835   0.003871
    255   �        35368   0.003930

    Total:       9000000   1.000000

    Entropy = 7.999979 bits per byte.

    Optimum compression would reduce the size
    of this 9000000 byte file by 0 percent.

    Chi square distribution for 9000000 samples is 258.77, and randomly
    would exceed this value 42.24 percent of the times.

    Arithmetic mean value of data bytes is 127.5006 (127.5 = random).
    Monte Carlo value for Pi is 3.141277333 (error 0.01 percent).
    Serial correlation coefficient is 0.000468 (totally uncorrelated =
    0.0).

This change was tested on a Nexus 5 phone (msm8974 SoC).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48630</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ

The commit referenced in the Fixes tag removed the 'break' from the else
branch in qcom_rng_read(), causing an infinite loop whenever 'max' is
not a multiple of WORD_SZ. This can be reproduced e.g. by running:

    kcapi-rng -b 67 &gt;/dev/null

There are many ways to fix this without adding back the 'break', but
they all seem more awkward than simply adding it back, so do just that.

Tested on a machine with Qualcomm Amberwing processor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48631</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0

When walking through an inode extents, the ext4_ext_binsearch_idx() function
assumes that the extent header has been previously validated.  However, there
are no checks that verify that the number of entries (eh-&gt;eh_entries) is
non-zero when depth is &gt; 0.  And this will lead to problems because the
EXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:

[  135.245946] ------------[ cut here ]------------
[  135.247579] kernel BUG at fs/ext4/extents.c:2258!
[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP
[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4
[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014
[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0
[  135.256475] Code:
[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246
[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023
[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c
[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c
[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024
[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000
[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0
[  135.277952] Call Trace:
[  135.278635]  &lt;TASK&gt;
[  135.279247]  ? preempt_count_add+0x6d/0xa0
[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0
[  135.281612]  ? _raw_read_unlock+0x18/0x30
[  135.282704]  ext4_map_blocks+0x294/0x5a0
[  135.283745]  ? xa_load+0x6f/0xa0
[  135.284562]  ext4_mpage_readpages+0x3d6/0x770
[  135.285646]  read_pages+0x67/0x1d0
[  135.286492]  ? folio_add_lru+0x51/0x80
[  135.287441]  page_cache_ra_unbounded+0x124/0x170
[  135.288510]  filemap_get_pages+0x23d/0x5a0
[  135.289457]  ? path_openat+0xa72/0xdd0
[  135.290332]  filemap_read+0xbf/0x300
[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40
[  135.292192]  new_sync_read+0x103/0x170
[  135.293014]  vfs_read+0x15d/0x180
[  135.293745]  ksys_read+0xa1/0xe0
[  135.294461]  do_syscall_64+0x3c/0x80
[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0

This patch simply adds an extra check in __ext4_ext_check(), verifying that
eh_entries is not 0 when eh_depth is &gt; 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48632</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()

memcpy() is called in a loop while 'operation-&gt;length' upper bound
is not checked and 'data_idx' also increments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48634</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48634" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix BUG: sleeping function called from invalid context errors

gma_crtc_page_flip() was holding the event_lock spinlock while calling
crtc_funcs-&gt;mode_set_base() which takes ww_mutex.

The only reason to hold event_lock is to clear gma_crtc-&gt;page_flip_event
on mode_set_base() errors.

Instead unlock it after setting gma_crtc-&gt;page_flip_event and on
errors re-take the lock and clear gma_crtc-&gt;page_flip_event it
it is still set.

This fixes the following WARN/stacktrace:

[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870
[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell
[  512.123031] preempt_count: 1, expected: 0
[  512.123048] RCU nest depth: 0, expected: 0
[  512.123066] INFO: lockdep is turned off.
[  512.123080] irq event stamp: 0
[  512.123094] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123134] hardirqs last disabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123176] softirqs last  enabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123207] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123233] Preemption disabled at:
[  512.123241] [&lt;0000000000000000&gt;] 0x0
[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1
[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013
[  512.123323] Call Trace:
[  512.123346]  &lt;TASK&gt;
[  512.123370]  dump_stack_lvl+0x5b/0x77
[  512.123412]  __might_resched.cold+0xff/0x13a
[  512.123458]  ww_mutex_lock+0x1e/0xa0
[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]
[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]
[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]
[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0
[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.123936]  drm_ioctl_kernel+0xa1/0x150
[  512.123984]  drm_ioctl+0x21f/0x420
[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60
[  512.124104]  ? lock_release+0x1ef/0x2d0
[  512.124161]  __x64_sys_ioctl+0x8d/0xd0
[  512.124203]  do_syscall_64+0x58/0x80
[  512.124239]  ? do_syscall_64+0x67/0x80
[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0
[  512.124300]  ? do_syscall_64+0x67/0x80
[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80
[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  512.124411] RIP: 0033:0x7fcc4a70740f
[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f
[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009
[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034
[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0
[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0
[  512.124647]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48636</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup

Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup
pointer being NULL.

The pavgroup pointer is checked on the entrance of the function but
without the lcu-&gt;lock being held. Therefore there is a race window
between dasd_alias_get_start_dev() and _lcu_update() which sets
pavgroup to NULL with the lcu-&gt;lock held.

Fix by checking the pavgroup pointer with lcu-&gt;lock held.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48637</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: prevent skb UAF after handing over to PTP worker

When reading the timestamp is required bnxt_tx_int() hands
over the ownership of the completed skb to the PTP worker.
The skb should not be used afterwards, as the worker may
run before the rest of our code and free the skb, leading
to a use-after-free.

Since dev_kfree_skb_any() accepts NULL make the loss of
ownership more obvious and set skb to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48638</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: cgroup_get_from_id() must check the looked-up kn is a directory

cgroup has to be one kernfs dir, otherwise kernel panic is caused,
especially cgroup id is provide from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48647</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix TX channel offset when using legacy interrupts

In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but
that's not correct if efx_sepparate_tx_channels is false. In that case,
the offset is 0 because the tx queues are in the single existing channel
at index 0, together with the rx queue.

Without this fix, as soon as you try to send any traffic, it tries to
get the tx queues from an uninitialized channel getting these errors:
  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48648</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix null pointer dereference in efx_hard_start_xmit

Trying to get the channel from the tx_queue variable here is wrong
because we can only be here if tx_queue is NULL, so we shouldn't
dereference it. As the above comment in the code says, this is very
unlikely to happen, but it's wrong anyway so let's fix it.

I hit this issue because of a different bug that caused tx_queue to be
NULL. If that happens, this is the error message that we get here:
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48650</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()

Commit 8f394da36a36 ("scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG")
made the __qlt_24xx_handle_abts() function return early if
tcm_qla2xxx_find_cmd_by_tag() didn't find a command, but it missed to clean
up the allocated memory for the management command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Fix out-of-bound bugs caused by unset skb-&gt;mac_header

If an AF_PACKET socket is used to send packets through ipvlan and the
default xmit function of the AF_PACKET socket is changed from
dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option
name of PACKET_QDISC_BYPASS, the skb-&gt;mac_header may not be reset and
remains as the initial value of 65535, this may trigger slab-out-of-bounds
bugs as following:

=================================================================
UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6
ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33
all Trace:
print_address_description.constprop.0+0x1d/0x160
print_report.cold+0x4f/0x112
kasan_report+0xa3/0x130
ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
ipvlan_start_xmit+0x29/0xa0 [ipvlan]
__dev_direct_xmit+0x2e2/0x380
packet_direct_xmit+0x22/0x60
packet_snd+0x7c9/0xc40
sock_sendmsg+0x9a/0xa0
__sys_sendto+0x18a/0x230
__x64_sys_sendto+0x74/0x90
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The root cause is:
  1. packet_snd() only reset skb-&gt;mac_header when sock-&gt;type is SOCK_RAW
     and skb-&gt;protocol is not specified as in packet_parse_headers()

  2. packet_direct_xmit() doesn't reset skb-&gt;mac_header as dev_queue_xmit()

In this case, skb-&gt;mac_header is 65535 when ipvlan_xmit_mode_l2() is
called. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which
use "skb-&gt;head + skb-&gt;mac_header", out-of-bound access occurs.

This patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()
and reset mac header in multicast to solve this out-of-bound bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223514">SUSE bug 1223514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48652" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix crash by keep old cfg when update TCs more than queues

There are problems if allocated queues less than Traffic Classes.

Commit a632b2a4c920 ("ice: ethtool: Prohibit improper channel config
for DCB") already disallow setting less queues than TCs.

Another case is if we first set less queues, and later update more TCs
config due to LLDP, ice_vsi_cfg_tc() will failed but left dirty
num_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.

[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.
[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!
[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0
[   95.969621] general protection fault: 0000 [#1] SMP NOPTI
[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1
[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021
[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60
[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 &lt;8b&gt; 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c
[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206
[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0
[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200
[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000
[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100
[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460
[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000
[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0
[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   95.971530] PKRU: 55555554
[   95.971573] Call Trace:
[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]
[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]
[   95.971774]  ice_vsi_open+0x25/0x120 [ice]
[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]
[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]
[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]
[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]
[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]
[   95.972220]  dcbnl_ieee_set+0x89/0x230
[   95.972279]  ? dcbnl_ieee_del+0x150/0x150
[   95.972341]  dcb_doit+0x124/0x1b0
[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0
[   95.972457]  ? dcb_doit+0x14d/0x1b0
[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280
[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100
[   95.972661]  netlink_rcv_skb+0xcf/0xf0
[   95.972720]  netlink_unicast+0x16d/0x220
[   95.972781]  netlink_sendmsg+0x2ba/0x3a0
[   95.975891]  sock_sendmsg+0x4c/0x50
[   95.979032]  ___sys_sendmsg+0x2e4/0x300
[   95.982147]  ? kmem_cache_alloc+0x13e/0x190
[   95.985242]  ? __wake_up_common_lock+0x79/0x90
[   95.988338]  ? __check_object_size+0xac/0x1b0
[   95.991440]  ? _copy_to_user+0x22/0x30
[   95.994539]  ? move_addr_to_user+0xbb/0xd0
[   95.997619]  ? __sys_sendmsg+0x53/0x80
[   96.000664]  __sys_sendmsg+0x53/0x80
[   96.003747]  do_syscall_64+0x5b/0x1d0
[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca

Only update num_txq/rxq when passed check, and restore tc_cfg if setup
queue map failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48653</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Don't double unplug aux on peer initiated reset

In the IDC callback that is accessed when the aux drivers request a reset,
the function to unplug the aux devices is called.  This function is also
called in the ice_prepare_for_reset function. This double call is causing
a "scheduling while atomic" BUG.

[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003

[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003

[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003

[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424

[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002
[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe
 r ttm
[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse
[  662.815557] Preemption disabled at:
[  662.815558] [&lt;0000000000000000&gt;] 0x0
[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2
[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021
[  662.815568] Call Trace:
[  662.815572]  &lt;IRQ&gt;
[  662.815574]  dump_stack_lvl+0x33/0x42
[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a
[  662.815588]  __schedule+0x798/0x990
[  662.815595]  schedule+0x44/0xc0
[  662.815597]  schedule_preempt_disabled+0x14/0x20
[  662.815600]  __mutex_lock.isra.11+0x46c/0x490
[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]
[  662.815633]  device_del+0x37/0x3d0
[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]
[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]
[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]
[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0
[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]
[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]
[  662.815756]  __handle_irq_event_percpu+0x4c/0x180
[  662.815762]  handle_irq_event_percpu+0xf/0x40
[  662.815764]  handle_irq_event+0x34/0x60
[  662.815766]  handle_edge_irq+0x9a/0x1c0
[  662.815770]  __common_interrupt+0x62/0x100
[  662.815774]  common_interrupt+0xb4/0xd0
[  662.815779]  &lt;/IRQ&gt;
[  662.815780]  &lt;TASK&gt;
[  662.815780]  asm_common_interrupt+0x1e/0x40
[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380
[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 &lt;0f&gt; 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49
[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202
[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f
[  662.815795] RDX: 0000009a52da2d08 R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48654</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()

nf_osf_find() incorrectly returns true on mismatch, this leads to
copying uninitialized memory area in nft_osf which can be used to leak
stale kernel stack data to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Harden accesses to the reset domains

Accessing reset domains descriptors by the index upon the SCMI drivers
requests through the SCMI reset operations interface can potentially
lead to out-of-bound violations if the SCMI driver misbehave.

Add an internal consistency check before any such domains descriptors
accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48656</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()

We should call of_node_put() for the reference returned by
of_parse_phandle() in fail path or when it is not used anymore.
Here we only need to move the of_node_put() before the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48657</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: topology: fix possible overflow in amu_fie_setup()

cpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,
while freq_inv_set_max_ratio() gets passed this frequency in Hz as 'u64'.
Multiplying max frequency by 1000 can potentially result in overflow --
multiplying by 1000ULL instead should avoid that...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully

When running gpio test on nxp-ls1028 platform with below command
gpiomon --num-events=3 --rising-edge gpiochip1 25
There will be a warning trace as below:
Call trace:
free_irq+0x204/0x360
lineevent_free+0x64/0x70
gpio_ioctl+0x598/0x6a0
__arm64_sys_ioctl+0xb4/0x100
invoke_syscall+0x5c/0x130
......
el0t_64_sync+0x1a0/0x1a4
The reason of this issue is that calling request_threaded_irq()
function failed, and then lineevent_free() is invoked to release
the resource. Since the lineevent_state::irq was already set, so
the subsequent invocation of free_irq() would trigger the above
warning call trace. To fix this issue, set the lineevent_state::irq
after the IRQ register successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48662</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Really move i915_gem_context.link under ref protection

i915_perf assumes that it can use the i915_gem_context reference to
protect its i915-&gt;gem.contexts.list iteration. However, this requires
that we do not remove the context from the list until after we drop the
final reference and release the struct. If, as currently, we remove the
context from the list during context_close(), the link.next pointer may
be poisoned while we are holding the context reference and cause a GPF:

[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff
[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP
[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180
[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017
[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]
[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 &lt;49&gt; 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff
[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202
[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000
[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68
[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc
[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860
[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc
[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000
[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0
[ 4070.575029] Call Trace:
[ 4070.575033]  &lt;TASK&gt;
[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]
[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]
[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]
[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40
[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575290]  drm_ioctl_kernel+0x85/0x110
[ 4070.575296]  ? update_load_avg+0x5f/0x5e0
[ 4070.575302]  drm_ioctl+0x1d3/0x370
[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]
[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0
[ 4070.575451]  ? __do_softirq+0xaa/0x1d2
[ 4070.575456]  do_syscall_64+0x35/0x80
[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 4070.575467] RIP: 0033:0x7f1ed5c10397
[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48
[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397
[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006
[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005
[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a
[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0
[ 4070.575505]  &lt;/TASK&gt;
[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223521">SUSE bug 1223521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48663</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: mockup: fix NULL pointer dereference when removing debugfs

We now remove the device's debugfs entries when unbinding the driver.
This now causes a NULL-pointer dereference on module exit because the
platform devices are unregistered *after* the global debugfs directory
has been recursively removed. Fix it by unregistering the devices first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in insert range

insert range doesn't discard the affected cached region
so can risk temporarily corrupting file data.

Also includes some minor cleanup (avoiding rereading
inode size repeatedly unnecessarily) to make it clearer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48668</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in collapse range

collapse range doesn't discard the affected cached region
so can risk temporarily corrupting the file data. This
fixes xfstest generic/031

I also decided to merge a minor cleanup to this into the same patch
(avoiding rereading inode size repeatedly unnecessarily) to make it
clearer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48671</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()

syzbot is hitting percpu_rwsem_assert_held(&amp;cpu_hotplug_lock) warning at
cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix
threadgroup_rwsem &lt;-&gt; cpus_read_lock() deadlock") missed that
cpuset_attach() is also called from cgroup_attach_task_all().
Add cpus_read_lock() like what cgroup_procs_write_start() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48672</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: fdt: fix off-by-one error in unflatten_dt_nodes()

Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree")
forgot to fix up the depth check in the loop body in unflatten_dt_nodes()
which makes it possible to overflow the nps[] buffer...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48673</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix possible access to freed memory in link clear

After modifying the QP to the Error state, all RX WR would be completed
with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not
wait for it is done, but destroy the QP and free the link group directly.
So there is a risk that accessing the freed memory in tasklet context.

Here is a crash example:

 BUG: unable to handle page fault for address: ffffffff8f220860
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060
 Oops: 0002 [#1] SMP PTI
 CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23
 Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018
 RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0
 Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e &lt;48&gt; 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32
 RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086
 RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000
 RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00
 RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b
 R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010
 R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  _raw_spin_lock_irqsave+0x30/0x40
  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]
  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]
  tasklet_action_common.isra.21+0x66/0x100
  __do_softirq+0xd5/0x29c
  asm_call_irq_on_stack+0x12/0x20
  &lt;/IRQ&gt;
  do_softirq_own_stack+0x37/0x40
  irq_exit_rcu+0x9d/0xa0
  sysvec_call_function_single+0x34/0x80
  asm_sysvec_call_function_single+0x12/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223940">SUSE bug 1223940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48675</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48675" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix a nested dead lock as part of ODP flow

Fix a nested dead lock as part of ODP flow by using mmput_async().

From the below call trace [1] can see that calling mmput() once we have
the umem_odp-&gt;umem_mutex locked as required by
ib_umem_odp_map_dma_and_lock() might trigger in the same task the
exit_mmap()-&gt;__mmu_notifier_release()-&gt;mlx5_ib_invalidate_range() which
may dead lock when trying to lock the same mutex.

Moving to use mmput_async() will solve the problem as the above
exit_mmap() flow will be called in other task and will be executed once
the lock will be available.

[1]
[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:
2 flags:0x00004000
[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]
[64843.077719] Call Trace:
[64843.077722]  &lt;TASK&gt;
[64843.077724]  __schedule+0x23d/0x590
[64843.077729]  schedule+0x4e/0xb0
[64843.077735]  schedule_preempt_disabled+0xe/0x10
[64843.077740]  __mutex_lock.constprop.0+0x263/0x490
[64843.077747]  __mutex_lock_slowpath+0x13/0x20
[64843.077752]  mutex_lock+0x34/0x40
[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]
[64843.077808]  __mmu_notifier_release+0x1a4/0x200
[64843.077816]  exit_mmap+0x1bc/0x200
[64843.077822]  ? walk_page_range+0x9c/0x120
[64843.077828]  ? __cond_resched+0x1a/0x50
[64843.077833]  ? mutex_lock+0x13/0x40
[64843.077839]  ? uprobe_clear_state+0xac/0x120
[64843.077860]  mmput+0x5f/0x140
[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]
[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]
[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]
[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560
[mlx5_ib]
[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]
[64843.078051]  process_one_work+0x22b/0x3d0
[64843.078059]  worker_thread+0x53/0x410
[64843.078065]  ? process_one_work+0x3d0/0x3d0
[64843.078073]  kthread+0x12a/0x150
[64843.078079]  ? set_kthread_struct+0x50/0x50
[64843.078085]  ret_from_fork+0x22/0x30
[64843.078093]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48686</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix UAF when detecting digest errors

We should also bail from the io_work loop when we set rd_enabled to true,
so we don't attempt to read data from the socket when the TCP stream is
already out-of-sync or corrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226337">SUSE bug 1226337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48687</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix out-of-bounds read when setting HMAC data.

The SRv6 layer allows defining HMAC data that can later be used to sign IPv6
Segment Routing Headers. This configuration is realised via netlink through
four attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and
SEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual
length of the SECRET attribute, it is possible to provide invalid combinations
(e.g., secret = "", secretlen = 64). This case is not checked in the code and
with an appropriately crafted netlink message, an out-of-bounds read of up
to 64 bytes (max secret length) can occur past the skb end pointer and into
skb_shared_info:

Breakpoint 1, seg6_genl_sethmac (skb=&lt;optimized out&gt;, info=&lt;optimized out&gt;) at net/ipv6/seg6.c:208
208		memcpy(hinfo-&gt;secret, secret, slen);
(gdb) bt
 #0  seg6_genl_sethmac (skb=&lt;optimized out&gt;, info=&lt;optimized out&gt;) at net/ipv6/seg6.c:208
 #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,
    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 &lt;init_net&gt;, family=&lt;optimized out&gt;,
    family=&lt;optimized out&gt;) at net/netlink/genetlink.c:731
 #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,
    family=0xffffffff82fef6c0 &lt;seg6_genl_family&gt;) at net/netlink/genetlink.c:775
 #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792
 #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 &lt;genl_rcv_msg&gt;)
    at net/netlink/af_netlink.c:2501
 #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803
 #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)
    at net/netlink/af_netlink.c:1319
 #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=&lt;optimized out&gt;)
    at net/netlink/af_netlink.c:1345
 #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=&lt;optimized out&gt;, msg=0xffffc90000ba7e48, len=&lt;optimized out&gt;) at net/netlink/af_netlink.c:1921
...
(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-&gt;head + ((struct sk_buff *)0xffff88800b1f9f00)-&gt;end
$1 = 0xffff88800b1b76c0
(gdb) p/x secret
$2 = 0xffff88800b1b76c0
(gdb) p slen
$3 = 64 '@'

The OOB data can then be read back from userspace by dumping HMAC state. This
commit fixes this by ensuring SECRETLEN cannot exceed the actual length of
SECRET.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224043">SUSE bug 1224043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48688</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix kernel crash during module removal

The driver incorrectly frees client instance and subsequent
i40e module removal leads to kernel crash.

Reproducer:
1. Do ethtool offline test followed immediately by another one
host# ethtool -t eth0 offline; ethtool -t eth0 offline
2. Remove recursively irdma module that also removes i40e module
host# modprobe -r irdma

Result:
[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110
[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2
[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01
[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1
[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030
[ 8687.768755] #PF: supervisor read access in kernel mode
[ 8687.773895] #PF: error_code(0x0000) - not-present page
[ 8687.779034] PGD 0 P4D 0
[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2
[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019
[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]
[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb &lt;48&gt; 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b
[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202
[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000
[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000
[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000
[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0
[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008
[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000
[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0
[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 8687.905572] PKRU: 55555554
[ 8687.908286] Call Trace:
[ 8687.910737]  &lt;TASK&gt;
[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]
[ 8687.917040]  pci_device_remove+0x33/0xa0
[ 8687.920962]  device_release_driver_internal+0x1aa/0x230
[ 8687.926188]  driver_detach+0x44/0x90
[ 8687.929770]  bus_remove_driver+0x55/0xe0
[ 8687.933693]  pci_unregister_driver+0x2a/0xb0
[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]

Two offline tests cause IRDMA driver failure (ETIMEDOUT) and this
failure is indicated back to i40e_client_subtask() that calls
i40e_client_del_instance() to free client instance referenced
by pf-&gt;cinst and sets this pointer to NULL. During the module
removal i40e_remove() calls i40e_lan_del_device() that dereferences
pf-&gt;cinst that is NULL -&gt; crash.
Do not remove client instance when client open callbacks fails and
just clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs
to take care about this situation (when netdev is up and client
is NOT opened) in i40e_notify_client_of_netdev_close() and
calls client close callback only when __I40E_CLIENT_INSTANCE_OPENED
is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48692" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Set scmnd-&gt;result only when scmnd is not NULL

This change fixes the following kernel NULL pointer dereference
which is reproduced by blktests srp/007 occasionally.

BUG: kernel NULL pointer dereference, address: 0000000000000170
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014
Workqueue:  0x0 (kblockd)
RIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]
Code: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 &lt;41&gt; 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9
RSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282
RAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000
RDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff
RBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001
R10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000
R13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
 __ib_process_cq+0xb7/0x280 [ib_core]
 ib_poll_handler+0x2b/0x130 [ib_core]
 irq_poll_softirq+0x93/0x150
 __do_softirq+0xee/0x4b8
 irq_exit_rcu+0xf7/0x130
 sysvec_apic_timer_interrupt+0x8e/0xc0
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48693" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs

In brcmstb_pm_probe(), there are two kinds of leak bugs:

(1) we need to add of_node_put() when for_each__matching_node() breaks
(2) we need to add iounmap() for each iomap in fail path
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48694</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48694" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix drain SQ hang with no completion

SW generated completions for outstanding WRs posted on SQ
after QP is in error target the wrong CQ. This causes the
ib_drain_sq to hang with no completion.

Fix this to generate completions on the right CQ.

[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.
[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1
[  863.986588] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000
[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]
[  864.014056] Call Trace:
[  864.017575]  __schedule+0x206/0x580
[  864.022296]  schedule+0x43/0xa0
[  864.026736]  schedule_timeout+0x115/0x150
[  864.032185]  __wait_for_common+0x93/0x1d0
[  864.037717]  ? usleep_range_state+0x90/0x90
[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]
[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]
[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]
[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]
[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]
[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]
[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]
[  864.088718]  process_one_work+0x1e8/0x3c0
[  864.094170]  worker_thread+0x50/0x3b0
[  864.099109]  ? rescuer_thread+0x370/0x370
[  864.104473]  kthread+0x149/0x170
[  864.109022]  ? set_kthread_struct+0x40/0x40
[  864.114713]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during
controller reset:

refcount_t: underflow; use-after-free.
WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48697</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48697" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a use-after-free

Fix the following use-after-free complaint triggered by blktests nvme/004:

BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350
Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460
Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]
Call Trace:
 show_stack+0x52/0x58
 dump_stack_lvl+0x49/0x5e
 print_report.cold+0x36/0x1e2
 kasan_report+0xb9/0xf0
 __asan_load4+0x6b/0x80
 blk_mq_complete_request_remote+0xac/0x350
 nvme_loop_queue_response+0x1df/0x275 [nvme_loop]
 __nvmet_req_complete+0x132/0x4f0 [nvmet]
 nvmet_req_complete+0x15/0x40 [nvmet]
 nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]
 nvme_loop_execute_work+0x20/0x30 [nvme_loop]
 process_one_work+0x56e/0xa70
 worker_thread+0x2d1/0x640
 kthread+0x183/0x1c0
 ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48699</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/debug: fix dentry leak in update_sched_domain_debugfs

Kuyo reports that the pattern of using debugfs_remove(debugfs_lookup())
leaks a dentry and with a hotplug stress test, the machine eventually
runs out of memory.

Fix this up by using the newly created debugfs_lookup_and_remove() call
instead which properly handles the dentry reference counting logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48700</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48701</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()

There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.

Fix this by checking the number of interfaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48702</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()

The voice allocator sometimes begins allocating from near the end of the
array and then wraps around, however snd_emu10k1_pcm_channel_alloc()
accesses the newly allocated voices as if it never wrapped around.

This results in out of bounds access if the first voice has a high enough
index so that first_voice + requested_voice_count &gt; NUM_G (64).
The more voices are requested, the more likely it is for this to occur.

This was initially discovered using PipeWire, however it can be reproduced
by calling aplay multiple times with 16 channels:
aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero

UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40
index 65 is out of range for type 'snd_emu10k1_voice [64]'
CPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7
Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
ubsan_epilogue+0x9/0x3f
__ubsan_handle_out_of_bounds.cold+0x44/0x49
snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]
snd_pcm_hw_params+0x29f/0x600 [snd_pcm]
snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]
? exit_to_user_mode_prepare+0x35/0x170
? do_syscall_64+0x69/0x90
? syscall_exit_to_user_mode+0x26/0x50
? do_syscall_64+0x69/0x90
? exit_to_user_mode_prepare+0x35/0x170
snd_pcm_ioctl+0x27/0x40 [snd_pcm]
__x64_sys_ioctl+0x95/0xd0
do_syscall_64+0x5c/0x90
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48703</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR

In some case, the GDDV returns a package with a buffer which has
zero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).

Then the data_vault_read() got NULL point dereference problem when
accessing the 0x10 value in data_vault.

[   71.024560] BUG: kernel NULL pointer dereference, address:
0000000000000010

This patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or
NULL value in data_vault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48704</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48704" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: add a force flush to delay work when radeon

Although radeon card fence and wait for gpu to finish processing current batch rings,
there is still a corner case that radeon lockup work queue may not be fully flushed,
and meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to
put device in D3hot state.
Per PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.
&gt; Configuration and Message requests are the only TLPs accepted by a Function in
&gt; the D3hot state. All other received Requests must be handled as Unsupported Requests,
&gt; and all received Completions may optionally be handled as Unexpected Completions.
This issue will happen in following logs:
Unable to handle kernel paging request at virtual address 00008800e0008010
CPU 0 kworker/0:3(131): Oops 0
pc = [&lt;ffffffff811bea5c&gt;]  ra = [&lt;ffffffff81240844&gt;]  ps = 0000 Tainted: G        W
pc is at si_gpu_check_soft_reset+0x3c/0x240
ra is at si_dma_is_lockup+0x34/0xd0
v0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000
t2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258
t5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000
s0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018
s3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000
s6 = fff00007ef07bd98
a0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008
a3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338
t8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800
t11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000
gp = ffffffff81d89690  sp = 00000000aa814126
Disabling lock debugging due to kernel taint
Trace:
[&lt;ffffffff81240844&gt;] si_dma_is_lockup+0x34/0xd0
[&lt;ffffffff81119610&gt;] radeon_fence_check_lockup+0xd0/0x290
[&lt;ffffffff80977010&gt;] process_one_work+0x280/0x550
[&lt;ffffffff80977350&gt;] worker_thread+0x70/0x7c0
[&lt;ffffffff80977410&gt;] worker_thread+0x130/0x7c0
[&lt;ffffffff80982040&gt;] kthread+0x200/0x210
[&lt;ffffffff809772e0&gt;] worker_thread+0x0/0x7c0
[&lt;ffffffff80981f8c&gt;] kthread+0x14c/0x210
[&lt;ffffffff80911658&gt;] ret_from_kernel_thread+0x18/0x20
[&lt;ffffffff80981e40&gt;] kthread+0x0/0x210
 Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101
 &lt;88210000&gt; 4821ed21
So force lockup work queue flush to fix this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48708</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48708" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: single: fix potential NULL dereference

Added checking of pointer "function" in pcs_set_mux().
pinmux_generic_get_function() can return NULL and the pointer
"function" was dereferenced without checking against NULL.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48709</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48709" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: switch: fix potential memleak in ice_add_adv_recipe()

When ice_add_special_words() fails, the 'rm' is not released, which will
lead to a memory leak. Fix this up by going to 'err_unroll' label.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48710</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix a possible null pointer dereference

In radeon_fp_native_mode(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.

The failure status of drm_cvt_mode() on the other path is checked too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0160</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    A deadlock flaw was found in the Linux kernel's BPF subsystem. This flaw allows a local user to potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0330</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0330" ref_url="https://www.suse.com/security/cve/CVE-2023-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0330/">CVE-2023-0330 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207205">SUSE bug 1207205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800600" comment="qemu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800547" comment="qemu-accel-tcg-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800548" comment="qemu-arm-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800601" comment="qemu-audio-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800602" comment="qemu-chardev-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800603" comment="qemu-guest-agent-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800604" comment="qemu-hw-display-qxl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800605" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800606" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800607" comment="qemu-hw-usb-redirect-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800518" comment="qemu-ipxe-1.0.0+-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800560" comment="qemu-s390x-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800526" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800527" comment="qemu-sgabios-8-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800608" comment="qemu-tools-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800609" comment="qemu-ui-opengl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800610" comment="qemu-ui-spice-core-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800535" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800565" comment="qemu-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0386</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel's OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210499">SUSE bug 1210499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0459</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
    <description>
    Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0512</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0512" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0512" ref_url="https://www.suse.com/security/cve/CVE-2023-0512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
    <description>
    Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0512/">CVE-2023-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0512">CVE-2023-0512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207780">SUSE bug 1207780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210385">SUSE bug 1210385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744036" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0687</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0687" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1718-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031740.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0687">CVE-2023-0687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207975">SUSE bug 1207975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743773" comment="glibc-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743774" comment="glibc-devel-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743775" comment="glibc-locale-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743776" comment="glibc-locale-base-2.31-150300.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0795</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208226">SUSE bug 1208226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0796</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0796" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208227">SUSE bug 1208227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0797</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208228">SUSE bug 1208228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208229">SUSE bug 1208229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0799</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208230">SUSE bug 1208230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0800</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208231">SUSE bug 1208231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0801</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208232">SUSE bug 1208232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0802</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0802" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208233">SUSE bug 1208233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0803</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208234">SUSE bug 1208234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208236">SUSE bug 1208236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0950</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0950" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0950" ref_url="https://www.suse.com/security/cve/CVE-2023-0950" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2023:3413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2023:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017614.html" source="SUSE-SU"/>
    <description>
    Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0950/">CVE-2023-0950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0950">CVE-2023-0950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209242">SUSE bug 1209242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217550">SUSE bug 1217550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009780429" comment="libxmlsec1-1-1.2.37-150400.14.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239762" comment="libxmlsec1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009780433" comment="libxmlsec1-openssl1-1.2.37-150400.14.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239766" comment="libxmlsec1-openssl1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1017</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1017" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1017">CVE-2023-1017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206022">SUSE bug 1206022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755867" comment="libtpms0-0.8.2-150300.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632653" comment="libtpms0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1018</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1018" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206023">SUSE bug 1206023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755867" comment="libtpms0-0.8.2-150300.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632653" comment="libtpms0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1077</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208839">SUSE bug 1208839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1127</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1127" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
    <description>
    Divide By Zero in GitHub repository vim/vim prior to 9.0.1367.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208828">SUSE bug 1208828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756061" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755949" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1170</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1170" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1170" ref_url="https://www.suse.com/security/cve/CVE-2023-1170" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1376.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1170/">CVE-2023-1170 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208959">SUSE bug 1208959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744036" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1175</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1175" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1175" ref_url="https://www.suse.com/security/cve/CVE-2023-1175" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
    <description>
    Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1175/">CVE-2023-1175 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208957">SUSE bug 1208957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009744036" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel's IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1249</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1249" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1264</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1264" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1264" ref_url="https://www.suse.com/security/cve/CVE-2023-1264" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1264/">CVE-2023-1264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1264">CVE-2023-1264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209042">SUSE bug 1209042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756061" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755949" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1281</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1281" ref_url="https://www.suse.com/security/cve/CVE-2023-1281" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016960.html" source="SUSE-SU"/>
		<reference ref_id="TID000021588" ref_url="https://www.suse.com/support/kb/doc/?id=000021588" source="SUSE-SU"/>
    <description>
    Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.
This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1281/">CVE-2023-1281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209634">SUSE bug 1209634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209683">SUSE bug 1209683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210423">SUSE bug 1210423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1355</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1355" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1355" ref_url="https://www.suse.com/security/cve/CVE-2023-1355" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1402.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1355/">CVE-2023-1355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1355">CVE-2023-1355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209187">SUSE bug 1209187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756061" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755949" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1380</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-&gt;req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1382</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A data race flaw was found in the Linux kernel, between where con is allocated and con-&gt;sock is set. This issue leads to a NULL pointer dereference when accessing con-&gt;sock-&gt;sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1611</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1611" ref_url="https://www.suse.com/security/cve/CVE-2023-1611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1611/">CVE-2023-1611 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209687">SUSE bug 1209687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1637</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
    <description>
    A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209797">SUSE bug 1209797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211188">SUSE bug 1211188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1670" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="TID000021588" ref_url="https://www.suse.com/support/kb/doc/?id=000021588" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210619">SUSE bug 1210619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220886">SUSE bug 1220886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228311">SUSE bug 1228311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802309" comment="suse-module-tools-15.4.18-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802364" comment="suse-module-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1859</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210169">SUSE bug 1210169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1916" ref_url="https://www.suse.com/security/cve/CVE-2023-1916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1916/">CVE-2023-1916 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916">CVE-2023-1916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210231">SUSE bug 1210231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1993-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1994-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028978.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210328">SUSE bug 1210328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754600" comment="avahi-0.8-150400.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754601" comment="libavahi-client3-0.8-150400.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754602" comment="libavahi-common3-0.8-150400.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754603" comment="libavahi-core7-0.8-150400.7.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210500">SUSE bug 1210500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1990</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1990" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1990" ref_url="https://www.suse.com/security/cve/CVE-2023-1990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1990/">CVE-2023-1990 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210501">SUSE bug 1210501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1998</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.

This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.



    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2002</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210566">SUSE bug 1210566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2004" ref_url="https://www.suse.com/security/cve/CVE-2023-2004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016036.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2004/">CVE-2023-2004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2004">CVE-2023-2004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210419">SUSE bug 1210419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009779699" comment="libfreetype6-2.10.4-150000.4.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151248" comment="libfreetype6 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210457">SUSE bug 1210457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2008" ref_url="https://www.suse.com/security/cve/CVE-2023-2008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2008/">CVE-2023-2008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2019</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2019" ref_url="https://www.suse.com/security/cve/CVE-2023-2019" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2019/">CVE-2023-2019 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210454">SUSE bug 1210454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20519</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20519" ref_url="https://www.suse.com/security/cve/CVE-2023-20519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.













    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20519/">CVE-2023-20519 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20519">CVE-2023-20519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20521" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20521" ref_url="https://www.suse.com/security/cve/CVE-2023-20521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20521/">CVE-2023-20521 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20521">CVE-2023-20521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20526</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20526" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20533</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20533" ref_url="https://www.suse.com/security/cve/CVE-2023-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-20533/">CVE-2023-20533 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20533">CVE-2023-20533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20566" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20566" ref_url="https://www.suse.com/security/cve/CVE-2023-20566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20566/">CVE-2023-20566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20566">CVE-2023-20566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
    <description>
    


A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.




















    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777869" comment="kernel-firmware-all-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777870" comment="kernel-firmware-amdgpu-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777871" comment="kernel-firmware-ath10k-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777872" comment="kernel-firmware-ath11k-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777873" comment="kernel-firmware-atheros-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777874" comment="kernel-firmware-bluetooth-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777875" comment="kernel-firmware-bnx2-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777876" comment="kernel-firmware-brcm-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777877" comment="kernel-firmware-chelsio-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777878" comment="kernel-firmware-dpaa2-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777879" comment="kernel-firmware-i915-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777880" comment="kernel-firmware-intel-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777881" comment="kernel-firmware-iwlwifi-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777882" comment="kernel-firmware-liquidio-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777883" comment="kernel-firmware-marvell-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777884" comment="kernel-firmware-media-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777885" comment="kernel-firmware-mediatek-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777886" comment="kernel-firmware-mellanox-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777887" comment="kernel-firmware-mwifiex-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777888" comment="kernel-firmware-network-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777889" comment="kernel-firmware-nfp-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777890" comment="kernel-firmware-nvidia-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777891" comment="kernel-firmware-platform-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777892" comment="kernel-firmware-prestera-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777893" comment="kernel-firmware-qcom-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777894" comment="kernel-firmware-qlogic-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777895" comment="kernel-firmware-radeon-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777896" comment="kernel-firmware-realtek-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777897" comment="kernel-firmware-serial-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777898" comment="kernel-firmware-sound-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777899" comment="kernel-firmware-ti-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777900" comment="kernel-firmware-ueagle-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777901" comment="kernel-firmware-usb-network-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777902" comment="ucode-amd-20220509-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778685" comment="xen-libs-4.16.5_02-150400.4.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20588</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 








    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20592</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20592" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.













    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215823">SUSE bug 1215823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3206-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018178.html" source="SUSE-SU"/>
    <description>
    
An issue in "Zen 2" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.







    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774833" comment="kernel-firmware-all-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774834" comment="kernel-firmware-amdgpu-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774835" comment="kernel-firmware-ath10k-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774836" comment="kernel-firmware-ath11k-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774837" comment="kernel-firmware-atheros-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774838" comment="kernel-firmware-bluetooth-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774839" comment="kernel-firmware-bnx2-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774840" comment="kernel-firmware-brcm-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774841" comment="kernel-firmware-chelsio-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774842" comment="kernel-firmware-dpaa2-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774843" comment="kernel-firmware-i915-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774844" comment="kernel-firmware-intel-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774845" comment="kernel-firmware-iwlwifi-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774846" comment="kernel-firmware-liquidio-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774847" comment="kernel-firmware-marvell-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774848" comment="kernel-firmware-media-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774849" comment="kernel-firmware-mediatek-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774850" comment="kernel-firmware-mellanox-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774851" comment="kernel-firmware-mwifiex-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774852" comment="kernel-firmware-network-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774853" comment="kernel-firmware-nfp-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774854" comment="kernel-firmware-nvidia-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774855" comment="kernel-firmware-platform-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774856" comment="kernel-firmware-prestera-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774857" comment="kernel-firmware-qcom-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774858" comment="kernel-firmware-qlogic-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774859" comment="kernel-firmware-radeon-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774860" comment="kernel-firmware-realtek-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774861" comment="kernel-firmware-serial-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774862" comment="kernel-firmware-sound-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774863" comment="kernel-firmware-ti-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774864" comment="kernel-firmware-ueagle-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774865" comment="kernel-firmware-usb-network-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774866" comment="ucode-amd-20220509-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778685" comment="xen-libs-4.16.5_02-150400.4.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2604-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016067.html" source="SUSE-SU"/>
    <description>
    A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212143">SUSE bug 1212143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214402">SUSE bug 1214402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009767211" comment="libvmtools0-12.2.0-150300.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009767212" comment="open-vm-tools-12.2.0-150300.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20897" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20897" ref_url="https://www.suse.com/security/cve/CVE-2023-20897" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202308:15234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202309:15230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202309:15233-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3862-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3865-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3866-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3877-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016389.html" source="SUSE-SU"/>
    <description>
    Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20897/">CVE-2023-20897 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20897">CVE-2023-20897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214796">SUSE bug 1214796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797702" comment="python3-salt-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797703" comment="salt-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797704" comment="salt-minion-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797705" comment="salt-transactional-update-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20898" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20898" ref_url="https://www.suse.com/security/cve/CVE-2023-20898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202308:15234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202309:15230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202309:15233-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3862-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3865-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3866-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3877-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016389.html" source="SUSE-SU"/>
    <description>
    Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20898/">CVE-2023-20898 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20898">CVE-2023-20898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214797">SUSE bug 1214797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797702" comment="python3-salt-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797703" comment="salt-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797704" comment="salt-minion-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797705" comment="salt-transactional-update-3006.0-150400.8.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031730.html" source="SUSE-SU"/>
    <description>
    A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214566">SUSE bug 1214566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797898" comment="libvmtools0-12.3.0-150300.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797899" comment="open-vm-tools-12.3.0-150300.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21102</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21102" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212346">SUSE bug 1212346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2124</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2137</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2137" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OJ2D7Q6EV4EW53HYRQAZZUTECASLJC3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOK6KL3HWOEESQP5YYTJH4ANDT2XMQRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVMVZHYNGC7MNXWYYPCKCBLKKYAGFJPY/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210618">SUSE bug 1210618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210660">SUSE bug 1210660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813076" comment="libsqlite3-0-3.44.0-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813077" comment="sqlite3-tcl-3.44.0-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009722601" comment="sqlite3-tcl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21400</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    In multiple functions  of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2156</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031544.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211395">SUSE bug 1211395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2162</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210662">SUSE bug 1210662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2163</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    Incorrect verifier pruning in BPF in Linux Kernel &gt;=5.4 leads to unsafe
code paths being incorrectly marked as safe, resulting in arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215518">SUSE bug 1215518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215519">SUSE bug 1215519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2166</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2176</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210630">SUSE bug 1210630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2177</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.

The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.

We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210987">SUSE bug 1210987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2255</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2255" ref_url="https://www.suse.com/security/cve/CVE-2023-2255" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2023:3413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2023:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017614.html" source="SUSE-SU"/>
    <description>
    Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2255/">CVE-2023-2255 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2255">CVE-2023-2255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211746">SUSE bug 1211746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217550">SUSE bug 1217550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217578">SUSE bug 1217578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009780429" comment="libxmlsec1-1-1.2.37-150400.14.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239762" comment="libxmlsec1-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009780433" comment="libxmlsec1-openssl1-1.2.37-150400.14.3.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239766" comment="libxmlsec1-openssl1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files.
This issue affects libeconf: before 0.5.2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2269</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2283</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211190">SUSE bug 1211190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23001</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017690.html" source="SUSE-SU"/>
    <description>
    In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802309" comment="suse-module-tools-15.4.18-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802364" comment="suse-module-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017138.html" source="SUSE-SU"/>
    <description>
    Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220178">SUSE bug 1220178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810835" comment="ucode-intel-20231114-150200.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
    <description>
    Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214099">SUSE bug 1214099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778161" comment="ucode-intel-20230808-150200.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2426</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2426" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2426" ref_url="https://www.suse.com/security/cve/CVE-2023-2426" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016048.html" source="SUSE-SU"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2426/">CVE-2023-2426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210996">SUSE bug 1210996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764656" comment="vim-data-common-9.0.1572-150000.5.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764903" comment="vim-small-9.0.1572-150000.5.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24329</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
    <description>
    An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213553">SUSE bug 1213553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213554">SUSE bug 1213554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213839">SUSE bug 1213839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225672">SUSE bug 1225672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747153" comment="libpython3_6m1_0-3.6.15-150300.10.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747154" comment="python3-3.6.15-150300.10.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009747155" comment="python3-base-3.6.15-150300.10.45.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24593" ref_url="https://www.suse.com/security/cve/CVE-2023-24593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014674.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Rejected by upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24593/">CVE-2023-24593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-24593">CVE-2023-24593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209714">SUSE bug 1209714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755558" comment="glib2-tools-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755559" comment="libgio-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755560" comment="libglib-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755561" comment="libgmodule-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755562" comment="libgobject-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2483</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25180" ref_url="https://www.suse.com/security/cve/CVE-2023-25180" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014674.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Rejected by upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25180/">CVE-2023-25180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25180">CVE-2023-25180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209713">SUSE bug 1209713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755558" comment="glib2-tools-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755559" comment="libgio-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755560" comment="libglib-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755561" comment="libgmodule-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755562" comment="libgobject-2_0-0-2.70.5-150400.3.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25433</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25433" ref_url="https://www.suse.com/security/cve/CVE-2023-25433" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25433/">CVE-2023-25433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25433">CVE-2023-25433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212883">SUSE bug 1212883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015408.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211418">SUSE bug 1211418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770177" comment="libcap2-2.63-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009770414" comment="libcap2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2603" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015622.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211419">SUSE bug 1211419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770177" comment="libcap2-2.63-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009770414" comment="libcap2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2609</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2609" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2609" ref_url="https://www.suse.com/security/cve/CVE-2023-2609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016048.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2609/">CVE-2023-2609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211256">SUSE bug 1211256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211257">SUSE bug 1211257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764656" comment="vim-data-common-9.0.1572-150000.5.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764903" comment="vim-small-9.0.1572-150000.5.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2610" ref_url="https://www.suse.com/security/cve/CVE-2023-2610" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016048.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2610/">CVE-2023-2610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211257">SUSE bug 1211257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764656" comment="vim-data-common-9.0.1572-150000.5.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764903" comment="vim-small-9.0.1572-150000.5.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26112</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26112" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26112" ref_url="https://www.suse.com/security/cve/CVE-2023-26112" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031116.html" source="SUSE-SU"/>
    <description>
    All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26112/">CVE-2023-26112 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26112">CVE-2023-26112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210070">SUSE bug 1210070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771765" comment="python3-configobj-5.0.6-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779466" comment="python3-configobj is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26484" ref_url="https://www.suse.com/security/cve/CVE-2023-26484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1967-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028964.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. In versions 0.59.0 and prior, if a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs. This can be misused to lure-in system-level-privileged components which can, for instance, read all secrets on the cluster, or can exec into pods on other nodes. This way, a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster. The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node. No patches are available as of time of publication. As a workaround, gatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26484/">CVE-2023-26484 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26484">CVE-2023-26484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209359">SUSE bug 1209359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754984" comment="kubevirt-manifests-0.54.0-150400.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754991" comment="kubevirt-virtctl-0.54.0-150400.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2650</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2327-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2328-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2330-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:29171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030013.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing some specially crafted ASN.1 object identifiers or
data containing them may be very slow.

Impact summary: Applications that use OBJ_obj2txt() directly, or use any of
the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message
size limit may experience notable to very long delays when processing those
messages, which may lead to a Denial of Service.

An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -
most of which have no size limit.  OBJ_obj2txt() may be used to translate
an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL
type ASN1_OBJECT) to its canonical numeric text form, which are the
sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by
periods.

When one of the sub-identifiers in the OBJECT IDENTIFIER is very large
(these are sizes that are seen as absurdly large, taking up tens or hundreds
of KiBs), the translation to a decimal number in text may take a very long
time.  The time complexity is O(n^2) with 'n' being the size of the
sub-identifiers in bytes (*).

With OpenSSL 3.0, support to fetch cryptographic algorithms using names /
identifiers in string form was introduced.  This includes using OBJECT
IDENTIFIERs in canonical numeric text form as identifiers for fetching
algorithms.

Such OBJECT IDENTIFIERs may be received through the ASN.1 structure
AlgorithmIdentifier, which is commonly used in multiple protocols to specify
what cryptographic algorithm should be used to sign or verify, encrypt or
decrypt, or digest passed data.

Applications that call OBJ_obj2txt() directly with untrusted data are
affected, with any version of OpenSSL.  If the use is for the mere purpose
of display, the severity is considered low.

In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,
CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509
certificates, including simple things like verifying its signature.

The impact on TLS is relatively low, because all versions of OpenSSL have a
100KiB limit on the peer's certificate chain.  Additionally, this only
impacts clients, or servers that have explicitly enabled client
authentication.

In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,
such as X.509 certificates.  This is assumed to not happen in such a way
that it would cause a Denial of Service, so these versions are considered
not affected by this issue in such a way that it would be cause for concern,
and the severity is therefore considered low.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763997" comment="libopenssl-1_1-devel-1.1.1l-150400.7.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763998" comment="libopenssl1_1-1.1.1l-150400.7.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763999" comment="libopenssl1_1-hmac-1.1.1l-150400.7.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764000" comment="openssl-1_1-1.1.1l-150400.7.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212398">SUSE bug 1212398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212881">SUSE bug 1212881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2700</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2700" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEZKWHJBBGGKIPJ6SR2VA5UMFQO2PBNJ/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211390">SUSE bug 1211390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764001" comment="libvirt-client-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764002" comment="libvirt-daemon-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764003" comment="libvirt-daemon-driver-interface-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764004" comment="libvirt-daemon-driver-network-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764005" comment="libvirt-daemon-driver-nodedev-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764006" comment="libvirt-daemon-driver-nwfilter-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764007" comment="libvirt-daemon-driver-qemu-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764008" comment="libvirt-daemon-driver-secret-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764009" comment="libvirt-daemon-driver-storage-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764010" comment="libvirt-daemon-driver-storage-core-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764011" comment="libvirt-daemon-driver-storage-disk-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764012" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764013" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764014" comment="libvirt-daemon-driver-storage-logical-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764015" comment="libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763777" comment="libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764016" comment="libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764017" comment="libvirt-daemon-qemu-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764018" comment="libvirt-libs-8.0.0-150400.7.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27043</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0329-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
    <description>
    The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222537">SUSE bug 1222537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848499" comment="libpython3_6m1_0-3.6.15-150300.10.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848500" comment="python3-3.6.15-150300.10.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848501" comment="python3-base-3.6.15-150300.10.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2731</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211478">SUSE bug 1211478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27349</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27349" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2533-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2562-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2605-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018026.html" source="SUSE-SU"/>
    <description>
    BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.

The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210398">SUSE bug 1210398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009767001" comment="libbluetooth3-5.62-150400.4.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27371</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27371" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1686-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014542.html" source="SUSE-SU"/>
    <description>
    GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208745">SUSE bug 1208745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009742931" comment="libmicrohttpd12-0.9.57-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009751539" comment="libmicrohttpd12 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28319</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28319" ref_url="https://www.suse.com/security/cve/CVE-2023-28319" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in curl &lt;v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28319/">CVE-2023-28319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211230">SUSE bug 1211230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760493" comment="curl-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760494" comment="libcurl4-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28320</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029436.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability exists in curl &lt;v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211231">SUSE bug 1211231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218210">SUSE bug 1218210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760493" comment="curl-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760494" comment="libcurl4-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28321</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029436.html" source="SUSE-SU"/>
    <description>
    An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211232">SUSE bug 1211232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218210">SUSE bug 1218210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760493" comment="curl-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760494" comment="libcurl4-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029436.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760493" comment="curl-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009760494" comment="libcurl4-8.0.1-150400.5.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28370</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28370" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015735.html" source="SUSE-SU"/>
    <description>
    Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774216" comment="python3-salt-3006.0-150400.8.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774213" comment="python3-tornado-4.5.3-150000.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009776229" comment="python3-tornado is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774217" comment="salt-3006.0-150400.8.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774218" comment="salt-minion-3006.0-150400.8.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774219" comment="salt-transactional-update-3006.0-150400.8.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28410</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28410" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211819">SUSE bug 1211819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211111">SUSE bug 1211111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220130">SUSE bug 1220130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28466</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210452">SUSE bug 1210452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755320" comment="libxml2-2-2.9.14-150400.5.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755321" comment="libxml2-tools-2.9.14-150400.5.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755322" comment="python3-libxml2-2.9.14-150400.5.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2861" ref_url="https://www.suse.com/security/cve/CVE-2023-2861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036649.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2861/">CVE-2023-2861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212968">SUSE bug 1212968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777401" comment="qemu-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777182" comment="qemu-accel-tcg-x86-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777183" comment="qemu-arm-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777402" comment="qemu-audio-spice-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777403" comment="qemu-chardev-spice-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777404" comment="qemu-guest-agent-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777405" comment="qemu-hw-display-qxl-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777406" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777407" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777408" comment="qemu-hw-usb-redirect-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777056" comment="qemu-ipxe-1.0.0+-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777195" comment="qemu-s390x-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777064" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777065" comment="qemu-sgabios-8-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777409" comment="qemu-tools-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777410" comment="qemu-ui-opengl-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777411" comment="qemu-ui-spice-core-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777073" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777200" comment="qemu-x86-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28736</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28736" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28736" ref_url="https://www.suse.com/security/cve/CVE-2023-28736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016488.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28736/">CVE-2023-28736 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28736">CVE-2023-28736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214244">SUSE bug 1214244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009782049" comment="mdadm-4.1-150300.24.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009799720" comment="mdadm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="TID000021404" ref_url="https://www.suse.com/support/kb/doc/?id=000021404" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853080" comment="xen-libs-4.16.5_14-150400.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28840" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016100.html" source="SUSE-SU"/>
    <description>
    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docker*.

Swarm Mode, which is compiled in and delivered by default in dockerd and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code.

The overlay network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.

Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.

When setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the u32 iptables extension provided by the xt_u32 kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.

Two iptables rules serve to filter incoming VXLAN datagrams with a VNI that corresponds to an encrypted network and discards unencrypted datagrams. The rules are appended to the end of the INPUT filter chain, following any rules that have been previously set by the system administrator. Administrator-set rules take precedence over the rules Moby sets to discard unencrypted VXLAN datagrams, which can potentially admit unencrypted datagrams that should have been discarded.

The injection of arbitrary Ethernet frames can enable a Denial of Service attack. A sophisticated attacker may be able to establish a UDP or TCP connection by way of the container's outbound gateway that would otherwise be blocked by a stateful firewall, or carry out other escalations beyond simple injection by smuggling packets into the overlay network.

Patches are available in Moby releases 23.0.3 and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.

Some workarounds are available. Close the VXLAN port (by default, UDP port 4789) to incoming traffic at the Internet boundary to prevent all VXLAN packet injection, and/or ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214107">SUSE bug 1214107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215525">SUSE bug 1215525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781414" comment="docker-24.0.5_ce-150000.185.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28841" ref_url="https://www.suse.com/security/cve/CVE-2023-28841" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016100.html" source="SUSE-SU"/>
    <description>
    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker*.

Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code.

The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with the VXLAN metadata, including a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.

Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.

When setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.

An iptables rule designates outgoing VXLAN datagrams with a VNI that corresponds to an encrypted overlay network for IPsec encapsulation.

Encrypted overlay networks on affected platforms silently transmit unencrypted data. As a result, `overlay` networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees.

It is possible for an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network, resulting in unexpected secrets or user data disclosure. Thus, because many database protocols, internal APIs, etc. are not protected by a second layer of encryption, a user may use Swarm encrypted overlay networks to provide confidentiality, which due to this vulnerability this is no longer guaranteed.

Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.

Some workarounds are available. Close the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary in order to prevent unintentionally leaking unencrypted traffic over the Internet, and/or ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28841/">CVE-2023-28841 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214108">SUSE bug 1214108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215525">SUSE bug 1215525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781414" comment="docker-24.0.5_ce-150000.185.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28842" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28842" ref_url="https://www.suse.com/security/cve/CVE-2023-28842" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016100.html" source="SUSE-SU"/>
    <description>
    Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker*.

Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code.

The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with the VXLAN metadata, including a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.

Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.

When setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.

The `overlay` driver dynamically and lazily defines the kernel configuration for the VXLAN network on each node as containers are attached and detached. Routes and encryption parameters are only defined for destination nodes that participate in the network. The iptables rules that prevent encrypted overlay networks from accepting unencrypted packets are not created until a peer is available with which to communicate.

Encrypted overlay networks silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The implications of this can be quite dire, and GHSA-vwm3-crmr-xfxw should be referenced for a deeper exploration.

Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.

Some workarounds are available. In multi-node clusters, deploy a global 'pause' container for each encrypted overlay network, on every node. For a single-node cluster, do not use overlay networks of any sort. Bridge networks provide the same connectivity on a single node and have no multi-node features. The Swarm ingress feature is implemented using an overlay network, but can be disabled by publishing ports in `host` mode instead of `ingress` mode (allowing the use of an external load balancer), and removing the `ingress` network. If encrypted overlay networks are in exclusive use, block UDP port 4789 from traffic that has not been validated by IPSec.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28842/">CVE-2023-28842 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214109">SUSE bug 1214109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215525">SUSE bug 1215525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781414" comment="docker-24.0.5_ce-150000.185.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28938" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28938" ref_url="https://www.suse.com/security/cve/CVE-2023-28938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016488.html" source="SUSE-SU"/>
    <description>
    Uncontrolled resource consumption in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a priviledged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28938/">CVE-2023-28938 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28938">CVE-2023-28938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214245">SUSE bug 1214245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009782049" comment="mdadm-4.1-150300.24.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009799720" comment="mdadm is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2908" ref_url="https://www.suse.com/security/cve/CVE-2023-2908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2908/">CVE-2023-2908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2908">CVE-2023-2908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212888">SUSE bug 1212888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29383</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29383" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036530.html" source="SUSE-SU"/>
    <description>
    In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210507">SUSE bug 1210507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851790" comment="login_defs-4.8.1-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670997" comment="login_defs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851791" comment="shadow-4.8.1-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166874" comment="shadow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755320" comment="libxml2-2-2.9.14-150400.5.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755321" comment="libxml2-tools-2.9.14-150400.5.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009755322" comment="python3-libxml2-2.9.14-150400.5.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29491</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014765.html" source="SUSE-SU"/>
    <description>
    ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210434">SUSE bug 1210434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756063" comment="libncurses6-6.1-150000.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756064" comment="ncurses-utils-6.1-150000.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756065" comment="terminfo-6.1-150000.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756066" comment="terminfo-base-6.1-150000.5.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2953" ref_url="https://www.suse.com/security/cve/CVE-2023-2953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029841.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2953/">CVE-2023-2953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211795">SUSE bug 1211795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763996" comment="libldap-2_4-2-2.4.46-150200.14.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152789" comment="libldap-2_4-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009763721" comment="libldap-data-2.4.46-150200.14.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154130" comment="libldap-data is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2977</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029894.html" source="SUSE-SU"/>
    <description>
    A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211894">SUSE bug 1211894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764912" comment="opensc-0.22.0-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2985</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2985" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
    <description>
    A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30078" ref_url="https://www.suse.com/security/cve/CVE-2023-30078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30078/">CVE-2023-30078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30078">CVE-2023-30078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214597">SUSE bug 1214597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214598">SUSE bug 1214598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3019</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213269">SUSE bug 1213269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856046" comment="qemu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855895" comment="qemu-accel-tcg-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855896" comment="qemu-arm-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856047" comment="qemu-audio-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856048" comment="qemu-chardev-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856049" comment="qemu-guest-agent-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856050" comment="qemu-hw-display-qxl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856051" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856052" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856053" comment="qemu-hw-usb-redirect-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855913" comment="qemu-ipxe-1.0.0+-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855948" comment="qemu-s390x-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855917" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855918" comment="qemu-sgabios-8-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856054" comment="qemu-tools-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856055" comment="qemu-ui-opengl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856056" comment="qemu-ui-spice-core-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855925" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855926" comment="qemu-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30456</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30608</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30608" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:1637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:1637-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:1637-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015453.html" source="SUSE-SU"/>
    <description>
    sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227303">SUSE bug 1227303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202330630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30630</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30630" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029418.html" source="SUSE-SU"/>
    <description>
    Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30630">CVE-2023-30630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210418">SUSE bug 1210418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009754847" comment="dmidecode-3.4-150400.16.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755043" comment="dmidecode is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30772" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30772" ref_url="https://www.suse.com/security/cve/CVE-2023-30772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30772/">CVE-2023-30772 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210329">SUSE bug 1210329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.

The out-of-bounds write is caused by missing skb-&gt;cb  initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.


We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212849">SUSE bug 1212849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219701">SUSE bug 1219701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31083</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu-&gt;proto is set. A NULL pointer dereference may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31084</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&amp;fepriv-&gt;sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&amp;fepriv-&gt;sem) may block the process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31085" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-&gt;erasesize), used indirectly by ctrl_cdev_ioctl, when mtd-&gt;erasesize is 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210778">SUSE bug 1210778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3111</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31124</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android.  This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211607">SUSE bug 1211607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009762600" comment="libcares2-1.19.1-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31130</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31130" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue.  C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211606">SUSE bug 1211606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009762600" comment="libcares2-1.19.1-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31147</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211605">SUSE bug 1211605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009762600" comment="libcares2-1.19.1-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3117</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3117" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Duplicate of CVE-2023-3390.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212934">SUSE bug 1212934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31248</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213064">SUSE bug 1213064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3138</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030001.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212102">SUSE bug 1212102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212746">SUSE bug 1212746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213994">SUSE bug 1213994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009768087" comment="libX11-6-1.6.5-150000.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009767704" comment="libX11-data-1.6.5-150000.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009768088" comment="libX11-xcb1-1.6.5-150000.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3141</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31436</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-05-18"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211260">SUSE bug 1211260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224419">SUSE bug 1224419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2881-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
    <description>
    CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-05-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210999">SUSE bug 1210999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771462" comment="perl-5.26.1-150300.17.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771463" comment="perl-base-5.26.1-150300.17.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3161</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font-&gt;width and font-&gt;height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3164</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3164" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3164" ref_url="https://www.suse.com/security/cve/CVE-2023-3164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2028-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035959.html" source="SUSE-SU"/>
    <description>
    A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-14"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3164/">CVE-2023-3164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164">CVE-2023-3164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212233">SUSE bug 1212233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865820" comment="libtiff5-4.0.9-150000.45.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3180" ref_url="https://www.suse.com/security/cve/CVE-2023-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3180/">CVE-2023-3180 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3180">CVE-2023-3180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213925">SUSE bug 1213925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800600" comment="qemu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800547" comment="qemu-accel-tcg-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800548" comment="qemu-arm-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800601" comment="qemu-audio-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800602" comment="qemu-chardev-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800603" comment="qemu-guest-agent-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800604" comment="qemu-hw-display-qxl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800605" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800606" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800607" comment="qemu-hw-usb-redirect-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800518" comment="qemu-ipxe-1.0.0+-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800560" comment="qemu-s390x-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800526" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800527" comment="qemu-sgabios-8-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800608" comment="qemu-tools-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800609" comment="qemu-ui-opengl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800610" comment="qemu-ui-spice-core-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800535" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800565" comment="qemu-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32001</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32001" ref_url="https://www.suse.com/security/cve/CVE-2023-32001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015534.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** We issued this CVE pre-maturely, as we have subsequently realized that this issue points out a problem that there really is no safe measures around or protections for.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32001/">CVE-2023-32001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213237">SUSE bug 1213237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772448" comment="curl-8.0.1-150400.5.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772449" comment="libcurl4-8.0.1-150400.5.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32067</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009762600" comment="libcares2-1.19.1-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3212</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32181</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32181" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32181" ref_url="https://www.suse.com/security/cve/CVE-2023-32181" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32181/">CVE-2023-32181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32181">CVE-2023-32181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211187">SUSE bug 1211187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32324</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029664.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211643">SUSE bug 1211643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764295" comment="cups-config-2.2.7-150000.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009764296" comment="libcups2-2.2.7-150000.3.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32360</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016733.html" source="SUSE-SU"/>
    <description>
    An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797298" comment="cups-config-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797299" comment="libcups2-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3255</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213001">SUSE bug 1213001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777401" comment="qemu-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777182" comment="qemu-accel-tcg-x86-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777183" comment="qemu-arm-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777402" comment="qemu-audio-spice-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777403" comment="qemu-chardev-spice-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777404" comment="qemu-guest-agent-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777405" comment="qemu-hw-display-qxl-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777406" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777407" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777408" comment="qemu-hw-usb-redirect-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777056" comment="qemu-ipxe-1.0.0+-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777195" comment="qemu-s390x-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777064" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777065" comment="qemu-sgabios-8-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777409" comment="qemu-tools-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777410" comment="qemu-ui-opengl-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777411" comment="qemu-ui-spice-core-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777073" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777200" comment="qemu-x86-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3268</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
    <description>
    An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32681</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036241.html" source="SUSE-SU"/>
    <description>
    Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009767761" comment="python3-requests-2.24.0-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152097" comment="python3-requests is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32731</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32731" ref_url="https://www.suse.com/security/cve/CVE-2023-32731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32731/">CVE-2023-32731 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212180">SUSE bug 1212180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848276" comment="libabsl2308_0_0-20230802.1-150400.10.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848319" comment="libabsl2308_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848281" comment="libprotobuf-lite25_1_0-25.1-150400.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848324" comment="libprotobuf-lite25_1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32732</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32732" ref_url="https://www.suse.com/security/cve/CVE-2023-32732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url 

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32732/">CVE-2023-32732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212182">SUSE bug 1212182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20233301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3301</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213414">SUSE bug 1213414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777401" comment="qemu-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777182" comment="qemu-accel-tcg-x86-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777183" comment="qemu-arm-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777402" comment="qemu-audio-spice-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777403" comment="qemu-chardev-spice-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777404" comment="qemu-guest-agent-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777405" comment="qemu-hw-display-qxl-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777406" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777407" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777408" comment="qemu-hw-usb-redirect-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777056" comment="qemu-ipxe-1.0.0+-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777195" comment="qemu-s390x-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777064" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777065" comment="qemu-sgabios-8-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777409" comment="qemu-tools-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777410" comment="qemu-ui-opengl-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777411" comment="qemu-ui-spice-core-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777073" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777200" comment="qemu-x86-6.2.0-150400.37.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3316</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212535">SUSE bug 1212535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33460</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33460" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030996.html" source="SUSE-SU"/>
    <description>
    There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212928">SUSE bug 1212928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771735" comment="libyajl2-2.1.0-150000.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009710095" comment="libyajl2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3354</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3354" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212850">SUSE bug 1212850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800600" comment="qemu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800547" comment="qemu-accel-tcg-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800548" comment="qemu-arm-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800601" comment="qemu-audio-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800602" comment="qemu-chardev-spice-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800603" comment="qemu-guest-agent-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800604" comment="qemu-hw-display-qxl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800605" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800606" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800607" comment="qemu-hw-usb-redirect-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800518" comment="qemu-ipxe-1.0.0+-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800560" comment="qemu-s390x-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800526" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800527" comment="qemu-sgabios-8-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800608" comment="qemu-tools-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800609" comment="qemu-ui-opengl-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800610" comment="qemu-ui-spice-core-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800535" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800565" comment="qemu-x86-6.2.0-150400.37.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3357</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3357" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel AMD Sensor Fusion Hub driver. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3358</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3358" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.

Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.

We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3390</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.

Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.

We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212934">SUSE bug 1212934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216225">SUSE bug 1216225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33953" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33953" ref_url="https://www.suse.com/security/cve/CVE-2023-33953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:

- Unbounded memory buffering in the HPACK parser
- Unbounded CPU consumption in the HPACK parser

The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.

The unbounded memory buffering bugs:

- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.
- HPACK varints have an encoding quirk whereby an infinite number of 0's can be added at the start of an integer. gRPC's hpack parser needed to read all of them before concluding a parse.
- gRPC's metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc…
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-11-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33953/">CVE-2023-33953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214148">SUSE bug 1214148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202334049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34049</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202311:15242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017369.html" source="SUSE-SU"/>
    <description>
    The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-10"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215157">SUSE bug 1215157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809295" comment="python3-salt-3006.0-150400.8.49.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809291" comment="python3-simplejson-3.17.2-150300.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809307" comment="python3-simplejson is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809296" comment="salt-3006.0-150400.8.49.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809297" comment="salt-minion-3006.0-150400.8.49.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809298" comment="salt-transactional-update-3006.0-150400.8.49.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34058</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803782" comment="libvmtools0-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803783" comment="open-vm-tools-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34059</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the 
/dev/uinput file descriptor allowing them to simulate user inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225967">SUSE bug 1225967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803782" comment="libvmtools0-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803783" comment="open-vm-tools-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34241</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process.

The exact cause of this issue is the function `httpClose(con-&gt;http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/hosts.deny`.

Version 2.4.6 has a patch for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212230">SUSE bug 1212230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217457">SUSE bug 1217457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218317">SUSE bug 1218317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009769278" comment="cups-config-2.2.7-150000.3.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009769279" comment="libcups2-2.2.7-150000.3.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34319</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    The fix for XSA-423 added logic to Linux'es netback driver to deal with
a frontend splitting a packet in a way such that not all of the headers
would come in one piece.  Unfortunately the logic introduced there
didn't account for the extreme case of the entire packet being split
into as many pieces as permitted by the protocol, yet still being
smaller than the area that's specially dealt with to keep all (possible)
headers together.  Such an unusual packet would therefore trigger a
buffer overrun in the driver.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    For migration as well as to work around kernels unaware of L1TF (see
XSA-273), PV guests may be run in shadow paging mode.  Since Xen itself
needs to be mapped when PV guests run, Xen and shadowed PV guests run
directly the respective shadow page tables.  For 64-bit PV guests this
means running on the shadow of the guest root page table.

In the course of dealing with shortage of memory in the shadow pool
associated with a domain, shadows of page tables may be torn down.  This
tearing down may include the shadow root page table that the CPU in
question is presently running on.  While a precaution exists to
supposedly prevent the tearing down of the underlying live page table,
the time window covered by that precaution isn't large enough.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34323</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34323" ref_url="https://www.suse.com/security/cve/CVE-2023-34323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
    <description>
    When a transaction is committed, C Xenstored will first check
the quota is correct before attempting to commit any nodes.  It would
be possible that accounting is temporarily negative if a node has
been removed outside of the transaction.

Unfortunately, some versions of C Xenstored are assuming that the
quota cannot be negative and are using assert() to confirm it.  This
will lead to C Xenstored crash when tools are built without -DNDEBUG
(this is the default).

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34323/">CVE-2023-34323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34323">CVE-2023-34323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215744">SUSE bug 1215744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801299" comment="xen-libs-4.16.5_06-150400.4.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34324</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
    <description>
    Closing of an event channel in the Linux kernel can result in a deadlock.
This happens when the close is being performed in parallel to an unrelated
Xen console action and the handling of a Xen console interrupt in an
unprivileged guest.

The closing of an event channel is e.g. triggered by removal of a
paravirtual device on the other side. As this action will cause console
messages to be issued on the other side quite often, the chance of
triggering the deadlock is not neglectable.

Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel
on Arm doesn't use queued-RW-locks, which are required to trigger the
issue (on Arm32 a waiting writer doesn't block further readers to get
the lock).

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215745">SUSE bug 1215745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34325</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

libfsimage contains parsing code for several filesystems, most of them based on
grub-legacy code.  libfsimage is used by pygrub to inspect guest disks.

Pygrub runs as the same user as the toolstack (root in a priviledged domain).

At least one issue has been reported to the Xen Security Team that allows an
attacker to trigger a stack buffer overflow in libfsimage.  After further
analisys the Xen Security Team is no longer confident in the suitability of
libfsimage when run against guest controlled input with super user priviledges.

In order to not affect current deployments that rely on pygrub patches are
provided in the resolution section of the advisory that allow running pygrub in
deprivileged mode.

CVE-2023-4949 refers to the original issue in the upstream grub
project ("An attacker with local access to a system (either through a
disk or external drive) can present a modified XFS partition to
grub-legacy in such a way to exploit a memory corruption in grub's XFS
file system implementation.")  CVE-2023-34325 refers specifically to
the vulnerabilities in Xen's copy of libfsimage, which is decended
from a very old version of grub.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34326</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    The caching invalidation guidelines from the AMD-Vi specification (48882—Rev
3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction
(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU
TLB is not flushed.

Such stale DMA mappings can point to memory ranges not owned by the guest, thus
allowing access to unindented memory regions.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
    a previous vCPUs debug mask state.

 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
    This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
    up the CPU entirely.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34328</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
    a previous vCPUs debug mask state.

 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
    This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
    up the CPU entirely.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3446</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015773.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. One of those
checks confirms that the modulus ('p' parameter) is not too large. Trying to use
a very large modulus is slow and OpenSSL will not normally use a modulus which
is over 10,000 bits in length.

However the DH_check() function checks numerous aspects of the key or parameters
that have been supplied. Some of those checks use the supplied modulus value
even if it has already been found to be too large.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulernable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the '-check' option.

The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221185">SUSE bug 1221185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772748" comment="libopenssl-1_1-devel-1.1.1l-150400.7.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772749" comment="libopenssl1_1-1.1.1l-150400.7.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772750" comment="libopenssl1_1-hmac-1.1.1l-150400.7.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772751" comment="openssl-1_1-1.1.1l-150400.7.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
    <description>
    An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213173">SUSE bug 1213173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772450" comment="samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772451" comment="samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
    <description>
    A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213172">SUSE bug 1213172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772450" comment="samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772451" comment="samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34968</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
    <description>
    A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213171">SUSE bug 1213171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772450" comment="samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009772451" comment="samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015525.html" source="SUSE-SU"/>
    <description>
    D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212126">SUSE bug 1212126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009769280" comment="dbus-1-1.12.2-150400.18.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151535" comment="dbus-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009769281" comment="dbus-1-x11-1.12.2-150400.18.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151537" comment="dbus-1-x11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009769282" comment="libdbus-1-3-1.12.2-150400.18.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151538" comment="libdbus-1-3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35001</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031544.html" source="SUSE-SU"/>
    <description>
    Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213063">SUSE bug 1213063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213244">SUSE bug 1213244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3576</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213273">SUSE bug 1213273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212509">SUSE bug 1212509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35823</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35827</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35828" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35829" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35829" ref_url="https://www.suse.com/security/cve/CVE-2023-35829" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35829/">CVE-2023-35829 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212495">SUSE bug 1212495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35945" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html" source="SUSE-SU"/>
    <description>
    Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-07"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215713">SUSE bug 1215713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798971" comment="libnghttp2-14-1.40.0-150200.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36054</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016024.html" source="SUSE-SU"/>
    <description>
    lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214054">SUSE bug 1214054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217441">SUSE bug 1217441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217443">SUSE bug 1217443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218348">SUSE bug 1218348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219710">SUSE bug 1219710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777843" comment="krb5-1.19.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3609</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213587">SUSE bug 1213587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.

We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213584">SUSE bug 1213584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3611</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.

We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-05-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223973">SUSE bug 1223973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3618</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213274">SUSE bug 1213274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3219-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016338.html" source="SUSE-SU"/>
    <description>
    GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of FLAC audio files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20775.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776897" comment="gstreamer-plugins-base-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776898" comment="libgstallocators-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776899" comment="libgstapp-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776900" comment="libgstaudio-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776901" comment="libgstgl-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776902" comment="libgstpbutils-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776903" comment="libgstriff-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776904" comment="libgsttag-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776905" comment="libgstvideo-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37328</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016338.html" source="SUSE-SU"/>
    <description>
    GStreamer PGS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of PGS subtitle files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20994.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213131">SUSE bug 1213131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776897" comment="gstreamer-plugins-base-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776898" comment="libgstallocators-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776899" comment="libgstapp-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776900" comment="libgstaudio-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776901" comment="libgstgl-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776902" comment="libgstpbutils-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776903" comment="libgstriff-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776904" comment="libgsttag-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776905" comment="libgstvideo-1_0-0-1.20.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3758</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3758" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035531.html" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223100">SUSE bug 1223100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859893" comment="libsss_certmap0-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231790" comment="libsss_certmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859894" comment="libsss_idmap0-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859895" comment="libsss_nss_idmap0-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859896" comment="sssd-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859897" comment="sssd-common-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632505" comment="sssd-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859898" comment="sssd-krb5-common-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859899" comment="sssd-ldap-2.5.2-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3776</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-05-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215119">SUSE bug 1215119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223973">SUSE bug 1223973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3777</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215097">SUSE bug 1215097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38039" ref_url="https://www.suse.com/security/cve/CVE-2023-38039" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031742.html" source="SUSE-SU"/>
    <description>
    When curl retrieves an HTTP response, it stores the incoming headers so that
they can be accessed later via the libcurl headers API.

However, curl did not have a limit in how many or how large headers it would
accept in a response, allowing a malicious server to stream an endless series
of headers and eventually cause curl to run out of heap memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38039/">CVE-2023-38039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215026">SUSE bug 1215026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797300" comment="curl-8.0.1-150400.5.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797301" comment="libcurl4-8.0.1-150400.5.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3812</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213706">SUSE bug 1213706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3244-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3291-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016834.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777839" comment="libopenssl-1_1-devel-1.1.1l-150400.7.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777840" comment="libopenssl1_1-1.1.1l-150400.7.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777841" comment="libopenssl1_1-hmac-1.1.1l-150400.7.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803246" comment="libopenssl3-3.0.8-150400.4.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777842" comment="openssl-1_1-1.1.1l-150400.7.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Not a Security Issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38289</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38289" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38289" ref_url="https://www.suse.com/security/cve/CVE-2023-38289" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Not a Security Issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38289/">CVE-2023-38289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38289">CVE-2023-38289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213589">SUSE bug 1213589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38408</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015603.html" source="SUSE-SU"/>
		<reference ref_id="TID000021143" ref_url="https://www.suse.com/support/kb/doc/?id=000021143" source="SUSE-SU"/>
    <description>
    The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217034">SUSE bug 1217034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217035">SUSE bug 1217035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218970">SUSE bug 1218970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225676">SUSE bug 1225676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009773627" comment="openssh-8.4p1-150300.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009773628" comment="openssh-clients-8.4p1-150300.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009773629" comment="openssh-common-8.4p1-150300.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009773630" comment="openssh-fips-8.4p1-150300.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009773631" comment="openssh-server-8.4p1-150300.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035724.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216598">SUSE bug 1216598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852272" comment="avahi-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852273" comment="libavahi-client3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852274" comment="libavahi-common3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852275" comment="libavahi-core7-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38470</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035174.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-05-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215947">SUSE bug 1215947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810251" comment="avahi-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810252" comment="libavahi-client3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810253" comment="libavahi-common3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810254" comment="libavahi-core7-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38471</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035724.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216594">SUSE bug 1216594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852272" comment="avahi-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852273" comment="libavahi-client3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852274" comment="libavahi-common3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852275" comment="libavahi-core7-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38472</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035208.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-05-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216853">SUSE bug 1216853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814965" comment="avahi-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814966" comment="libavahi-client3-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814967" comment="libavahi-common3-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814968" comment="libavahi-core7-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38473</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017450.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216419">SUSE bug 1216419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810251" comment="avahi-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810252" comment="libavahi-client3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810253" comment="libavahi-common3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810254" comment="libavahi-core7-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38545</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
    <description>
    This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.

The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215888">SUSE bug 1215888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801459" comment="curl-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801460" comment="libcurl4-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4045-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017403.html" source="SUSE-SU"/>
    <description>
    This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).

If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215889">SUSE bug 1215889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801459" comment="curl-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801460" comment="libcurl4-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38575</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213603">SUSE bug 1213603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219704">SUSE bug 1219704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38633</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030820.html" source="SUSE-SU"/>
    <description>
    A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213502">SUSE bug 1213502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774221" comment="gdk-pixbuf-loader-rsvg-2.52.10-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009774222" comment="librsvg-2-2-2.52.10-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39189</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39189" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216046">SUSE bug 1216046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215858">SUSE bug 1215858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215861">SUSE bug 1215861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39197</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39198</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217116">SUSE bug 1217116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219703">SUSE bug 1219703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39368</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3666-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031569.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009782053" comment="libxml2-2-2.9.14-150400.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009782054" comment="libxml2-tools-2.9.14-150400.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009782055" comment="python3-libxml2-2.9.14-150400.5.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0070-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017615.html" source="SUSE-SU"/>
    <description>
    In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2024-07-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217969">SUSE bug 1217969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816615" comment="tar-1.34-150000.3.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214812">SUSE bug 1214812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031239.html" source="SUSE-SU"/>
    <description>
    Under some circumstances, this weakness allows a user who has access to run the "ps" utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-06-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214290">SUSE bug 1214290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778866" comment="libprocps7-3.3.15-150000.7.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009268885" comment="libprocps7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009778867" comment="procps-3.3.15-150000.7.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009229657" comment="procps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40217</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217524">SUSE bug 1217524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218319">SUSE bug 1218319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218476">SUSE bug 1218476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218965">SUSE bug 1218965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219713">SUSE bug 1219713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221582">SUSE bug 1221582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224883">SUSE bug 1224883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009794920" comment="libpython3_6m1_0-3.6.15-150300.10.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009794921" comment="python3-3.6.15-150300.10.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009794922" comment="python3-base-3.6.15-150300.10.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40225</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40225" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40225" ref_url="https://www.suse.com/security/cve/CVE-2023-40225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017412.html" source="SUSE-SU"/>
    <description>
    HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40225/">CVE-2023-40225 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40225">CVE-2023-40225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214102">SUSE bug 1214102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009779189" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4287-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017600.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** 

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains 
that target AArch64 allows an attacker to exploit an existing buffer 
overflow in dynamically-sized local variables in your application 
without this being detected. This stack-protector failure only applies 
to C99-style dynamically-sized local variables or those created using 
alloca(). The stack-protector operates as intended for statically-sized 
local variables.

The default behavior when the stack-protector 
detects an overflow is to terminate your application, resulting in 
controlled loss of availability. An attacker who can exploit a buffer 
overflow without triggering the stack-protector might be able to change 
program flow control to cause an uncontrolled loss of availability or to
 go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.






    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228298">SUSE bug 1228298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809550" comment="libgcc_s1-13.2.1+git7813-150000.1.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809551" comment="libstdc++6-13.2.1+git7813-150000.1.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215099">SUSE bug 1215099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40547</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215098">SUSE bug 1215098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40548</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215100">SUSE bug 1215100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40549</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215101">SUSE bug 1215101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40550</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215102">SUSE bug 1215102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40551</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215103">SUSE bug 1215103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40660" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016707.html" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215762">SUSE bug 1215762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801458" comment="opensc-0.22.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40661" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016707.html" source="SUSE-SU"/>
    <description>
    Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow 
compromise key generation, certificate loading, and other card management operations during enrollment.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215761">SUSE bug 1215761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801458" comment="opensc-0.22.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214687">SUSE bug 1214687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4091</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215904">SUSE bug 1215904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801461" comment="samba-client-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801462" comment="samba-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41175</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41175" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214686">SUSE bug 1214686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4128</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.  Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4133</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4133" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4134</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4134" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4147</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215118">SUSE bug 1215118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4154" ref_url="https://www.suse.com/security/cve/CVE-2023-4154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4154/">CVE-2023-4154 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4154">CVE-2023-4154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215908">SUSE bug 1215908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801461" comment="samba-client-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801462" comment="samba-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4155</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214022">SUSE bug 1214022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4156</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4156" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4156" ref_url="https://www.suse.com/security/cve/CVE-2023-4156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016026.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4156/">CVE-2023-4156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4156">CVE-2023-4156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214025">SUSE bug 1214025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009777837" comment="gawk-4.2.1-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009780094" comment="gawk is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode-&gt;i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4244</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.

We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215424">SUSE bug 1215424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42465</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0794-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0795-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0796-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0797-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0876-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018176.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219026">SUSE bug 1219026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221593">SUSE bug 1221593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224872">SUSE bug 1224872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851287" comment="sudo-1.9.9-150400.4.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42669</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215905">SUSE bug 1215905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801461" comment="samba-client-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801462" comment="samba-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4273</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214123">SUSE bug 1214123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
    <description>
    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-&gt;nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218613">SUSE bug 1218613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42754" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215467">SUSE bug 1215467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43490</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43785</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215683">SUSE bug 1215683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43786</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215684">SUSE bug 1215684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43787</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215685">SUSE bug 1215685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4352-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800538" comment="python3-urllib3-1.25.10-150300.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4387</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4389" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214351">SUSE bug 1214351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44487</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="TID000021240" ref_url="https://www.suse.com/support/kb/doc/?id=000021240" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TNFN6MBU4SQLAGX7GNFLRGTPGY3IBHZG/" source="SUSE-SU"/>
    <description>
    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216169">SUSE bug 1216169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216171">SUSE bug 1216171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216174">SUSE bug 1216174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216176">SUSE bug 1216176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216181">SUSE bug 1216181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216182">SUSE bug 1216182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216190">SUSE bug 1216190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848276" comment="libabsl2308_0_0-20230802.1-150400.10.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848319" comment="libabsl2308_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802970" comment="libnghttp2-14-1.40.0-150200.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848281" comment="libprotobuf-lite25_1_0-25.1-150400.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848324" comment="libprotobuf-lite25_1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4459</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4459" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4504</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016733.html" source="SUSE-SU"/>
    <description>
    Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215204">SUSE bug 1215204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217457">SUSE bug 1217457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217553">SUSE bug 1217553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218317">SUSE bug 1218317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218347">SUSE bug 1218347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221585">SUSE bug 1221585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797298" comment="cups-config-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797299" comment="libcups2-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3155-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4SYE7WTKUNXNTHQW42V7UBGJBEQBHRTP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZZCCVQLIJ7QABQ7SEQNIICQGIOXKWPA/" source="SUSE-SU"/>
    <description>
    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868463" comment="containerd-1.7.17-150000.111.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017191.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216129">SUSE bug 1216129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810408" comment="libxml2-2-2.9.14-150400.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810409" comment="libxml2-tools-2.9.14-150400.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810410" comment="python3-libxml2-2.9.14-150400.5.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45539</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8849" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035891.html" source="SUSE-SU"/>
    <description>
    HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217653">SUSE bug 1217653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814269" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4563</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4563" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This was assigned as a duplicate of CVE-2023-4244.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214727">SUSE bug 1214727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45803</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000678.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4352-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035989.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-17"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803402" comment="python3-urllib3-1.25.10-150300.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036532.html" source="SUSE-SU"/>
    <description>
    MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216378">SUSE bug 1216378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802971" comment="libz1-1.2.11-150000.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802972" comment="zlib-devel-1.2.11-150000.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251909" comment="zlib-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45862" ref_url="https://www.suse.com/security/cve/CVE-2023-45862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45862/">CVE-2023-45862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216051">SUSE bug 1216051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45918" ref_url="https://www.suse.com/security/cve/CVE-2023-45918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1133-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036538.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-45918/">CVE-2023-45918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45918">CVE-2023-45918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220061">SUSE bug 1220061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853557" comment="libncurses6-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853558" comment="ncurses-utils-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853559" comment="terminfo-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853560" comment="terminfo-base-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46103</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017305.html" source="SUSE-SU"/>
    <description>
    This flaw allows a malicious HTTP server to set "super cookies" in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with `domain=co.UK` when the URL used a lower
case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217573">SUSE bug 1217573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815364" comment="curl-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815365" comment="libcurl4-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46219</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46219" ref_url="https://www.suse.com/security/cve/CVE-2023-46219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
    <description>
    When saving HSTS data to an excessively long file name, curl could end up
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46219/">CVE-2023-46219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217574">SUSE bug 1217574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815364" comment="curl-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815365" comment="libcurl4-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.

The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.

We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215442">SUSE bug 1215442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219699">SUSE bug 1219699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46228</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46228" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46228" ref_url="https://www.suse.com/security/cve/CVE-2023-46228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2432-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036531.html" source="SUSE-SU"/>
    <description>
    zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46228/">CVE-2023-46228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46228">CVE-2023-46228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216268">SUSE bug 1216268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802976" comment="libzck1-1.1.16-150400.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009803766" comment="libzck1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4623</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.

If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.

We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215440">SUSE bug 1215440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219698">SUSE bug 1219698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46246</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46246" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46246" ref_url="https://www.suse.com/security/cve/CVE-2023-46246" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46246/">CVE-2023-46246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216696">SUSE bug 1216696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812201" comment="vim-data-common-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812851" comment="vim-small-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46316</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035983.html" source="SUSE-SU"/>
    <description>
    In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216591">SUSE bug 1216591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813366" comment="traceroute-2.0.21-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814074" comment="traceroute is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4641</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036530.html" source="SUSE-SU"/>
    <description>
    A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214806">SUSE bug 1214806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791547" comment="login_defs-4.8.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670997" comment="login_defs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791548" comment="shadow-4.8.1-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166874" comment="shadow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216896">SUSE bug 1216896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017515.html" source="SUSE-SU"/>
    <description>
    The current setup of the quarantine page tables assumes that the
quarantine domain (dom_io) has been initialized with an address width
of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.

However dom_io being a PV domain gets the AMD-Vi IOMMU page tables
levels based on the maximum (hot pluggable) RAM address, and hence on
systems with no RAM above the 512GB mark only 3 page-table levels are
configured in the IOMMU.

On systems without RAM above the 512GB boundary
amd_iommu_quarantine_init() will setup page tables for the scratch
page with 4 levels, while the IOMMU will be configured to use 3 levels
only, resulting in the last page table directory (PDE) effectively
becoming a page table entry (PTE), and hence a device in quarantine
mode gaining write access to the page destined to be a PDE.

Due to this page table level mismatch, the sink page the device gets
read/write access to is no longer cleared between device assignment,
possibly leading to data leaks.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216654">SUSE bug 1216654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46836</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017515.html" source="SUSE-SU"/>
    <description>
    The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative
Return Stack Overflow) are not IRQ-safe.  It was believed that the
mitigations always operated in contexts with IRQs disabled.

However, the original XSA-254 fix for Meltdown (XPTI) deliberately left
interrupts enabled on two entry paths; one unconditionally, and one
conditionally on whether XPTI was active.

As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations
are not active together by default.  Therefore, there is a race
condition whereby a malicious PV guest can bypass BTC/SRSO protections
and launch a BTC/SRSO attack against Xen.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216807">SUSE bug 1216807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    Transmit requests in Xen's virtual network protocol can consist of
multiple parts.  While not really useful, except for the initial part
any of them may be of zero length, i.e. carry no data at all.  Besides a
certain initial portion of the to be transferred data, these parts are
directly translated into what Linux calls SKB fragments.  Such converted
request parts can, when for a particular SKB they are all of length
zero, lead to a de-reference of NULL in core networking code.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46839</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/034056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018142.html" source="SUSE-SU"/>
    <description>
    PCI devices can make use of a functionality called phantom functions,
that when enabled allows the device to generate requests using the IDs
of functions that are otherwise unpopulated.  This allows a device to
extend the number of outstanding requests.

Such phantom functions need an IOMMU context setup, but failure to
setup the context is not fatal when the device is assigned.  Not
failing device assignment when such failure happens can lead to the
primary device being assigned to a guest, while some of the phantom
functions are assigned to a different domain.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218851">SUSE bug 1218851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009844743" comment="xen-libs-4.16.5_12-150400.4.46.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46841" ref_url="https://www.suse.com/security/cve/CVE-2023-46841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
    <description>
    Recent x86 CPUs offer functionality named Control-flow Enforcement
Technology (CET).  A sub-feature of this are Shadow Stacks (CET-SS).
CET-SS is a hardware feature designed to protect against Return Oriented
Programming attacks. When enabled, traditional stacks holding both data
and return addresses are accompanied by so called "shadow stacks",
holding little more than return addresses.  Shadow stacks aren't
writable by normal instructions, and upon function returns their
contents are used to check for possible manipulation of a return address
coming from the traditional stack.

In particular certain memory accesses need intercepting by Xen.  In
various cases the necessary emulation involves kind of replaying of
the instruction.  Such replaying typically involves filling and then
invoking of a stub.  Such a replayed instruction may raise an
exceptions, which is expected and dealt with accordingly.

Unfortunately the interaction of both of the above wasn't right:
Recovery involves removal of a call frame from the (traditional) stack.
The counterpart of this operation for the shadow stack was missing.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46841/">CVE-2023-46841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46841">CVE-2023-46841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219885">SUSE bug 1219885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851780" comment="xen-libs-4.16.5_14-150400.4.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036194.html" source="SUSE-SU"/>
    <description>
    Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes.  This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.

When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation.  Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers.  For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.

Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall.  When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221984">SUSE bug 1221984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854660" comment="xen-libs-4.16.6_02-150400.4.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016765.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-21"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215935">SUSE bug 1215935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217434">SUSE bug 1217434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217555">SUSE bug 1217555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219709">SUSE bug 1219709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221589">SUSE bug 1221589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227915">SUSE bug 1227915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801457" comment="grub2-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801065" comment="grub2-arm64-efi-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801070" comment="grub2-i386-pc-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801077" comment="grub2-s390x-emu-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801080" comment="grub2-snapper-plugin-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801082" comment="grub2-x86_64-efi-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801085" comment="grub2-x86_64-xen-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016765.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215936">SUSE bug 1215936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801457" comment="grub2-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801065" comment="grub2-arm64-efi-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801070" comment="grub2-i386-pc-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801077" comment="grub2-s390x-emu-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801080" comment="grub2-snapper-plugin-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801082" comment="grub2-x86_64-efi-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801085" comment="grub2-x86_64-xen-2.06-150400.11.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202347233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4733" ref_url="https://www.suse.com/security/cve/CVE-2023-4733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1840.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4733/">CVE-2023-4733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4733">CVE-2023-4733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215004">SUSE bug 1215004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4734</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4734" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214925">SUSE bug 1214925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214924">SUSE bug 1214924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4738" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214922">SUSE bug 1214922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4750</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4750" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4750" ref_url="https://www.suse.com/security/cve/CVE-2023-4750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1857.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4750/">CVE-2023-4750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4750">CVE-2023-4750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215005">SUSE bug 1215005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4752</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1858.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215006">SUSE bug 1215006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4781</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4781" ref_url="https://www.suse.com/security/cve/CVE-2023-4781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4781/">CVE-2023-4781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4781">CVE-2023-4781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215033">SUSE bug 1215033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215457">SUSE bug 1215457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4785</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4785" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4785" ref_url="https://www.suse.com/security/cve/CVE-2023-4785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. 
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-11-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4785/">CVE-2023-4785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4785">CVE-2023-4785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215334">SUSE bug 1215334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202347855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-25"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016723.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215286">SUSE bug 1215286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800217" comment="glibc-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800218" comment="glibc-devel-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800219" comment="glibc-locale-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800220" comment="glibc-locale-base-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48231</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48231" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48231" ref_url="https://www.suse.com/security/cve/CVE-2023-48231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48231/">CVE-2023-48231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217316">SUSE bug 1217316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48232" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48232" ref_url="https://www.suse.com/security/cve/CVE-2023-48232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48232/">CVE-2023-48232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217320">SUSE bug 1217320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48233" ref_url="https://www.suse.com/security/cve/CVE-2023-48233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48233/">CVE-2023-48233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217321">SUSE bug 1217321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48234</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48234" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48234" ref_url="https://www.suse.com/security/cve/CVE-2023-48234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48234/">CVE-2023-48234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217324">SUSE bug 1217324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48235" ref_url="https://www.suse.com/security/cve/CVE-2023-48235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an
overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48235/">CVE-2023-48235 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217326">SUSE bug 1217326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48236</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48236" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48236" ref_url="https://www.suse.com/security/cve/CVE-2023-48236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger
than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-48236/">CVE-2023-48236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217329">SUSE bug 1217329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48237</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48237" ref_url="https://www.suse.com/security/cve/CVE-2023-48237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48237/">CVE-2023-48237 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217330">SUSE bug 1217330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48706</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48706" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48706" ref_url="https://www.suse.com/security/cve/CVE-2023-48706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48706/">CVE-2023-48706 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217432">SUSE bug 1217432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48795</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021295" ref_url="https://www.suse.com/support/kb/doc/?id=000021295" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7UNBVBZXNPUVRYGXMQJVWO63X7TAJUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNYVAEZZNHEKG5C7JHU5U3MPN73U4OKG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L45IOOVVBSIBE7RRRVUWOWDGUABBZE4Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXSOYCFCX44QUQ434BAHHQRSSCB3KZG5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJ4UKYMVT5L6QOJVM6JMV6AQINAVT4JW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PE3D4WEFUCELLDKJUEM2KLPFMME7KTAI/" source="SUSE-SU"/>
    <description>
    The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848194" comment="libssh2-1-1.11.0-150000.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817184" comment="openssh-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817185" comment="openssh-clients-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817186" comment="openssh-common-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817187" comment="openssh-fips-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817188" comment="openssh-server-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4881</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-05-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49083</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035893.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217592">SUSE bug 1217592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813786" comment="python3-cryptography-3.3.2-150400.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().

We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-05-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215300">SUSE bug 1215300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220906">SUSE bug 1220906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224418">SUSE bug 1224418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50229</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50229" ref_url="https://www.suse.com/security/cve/CVE-2023-50229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-25"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50229/">CVE-2023-50229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50229">CVE-2023-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218300">SUSE bug 1218300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009844431" comment="libbluetooth3-5.62-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50230</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50230" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50230" ref_url="https://www.suse.com/security/cve/CVE-2023-50230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20938.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-25"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50230/">CVE-2023-50230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50230">CVE-2023-50230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218301">SUSE bug 1218301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009844431" comment="libbluetooth3-5.62-150400.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50495</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50495" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50495" ref_url="https://www.suse.com/security/cve/CVE-2023-50495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017439.html" source="SUSE-SU"/>
    <description>
    NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50495/">CVE-2023-50495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">CVE-2023-50495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218014">SUSE bug 1218014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816335" comment="libncurses6-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816336" comment="ncurses-utils-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816337" comment="terminfo-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816338" comment="terminfo-base-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51042</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51043</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51385</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018919.html" source="SUSE-SU"/>
    <description>
    In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218215">SUSE bug 1218215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848742" comment="openssh-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848743" comment="openssh-clients-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848744" comment="openssh-common-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848745" comment="openssh-fips-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848746" comment="openssh-server-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5158</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51779</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034860.html" source="SUSE-SU"/>
    <description>
    bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218610">SUSE bug 1218610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5178</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215768">SUSE bug 1215768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216044">SUSE bug 1216044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51780</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218733">SUSE bug 1218733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51782</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5197</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.

We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52160</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0764-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036997.html" source="SUSE-SU"/>
    <description>
    The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219975">SUSE bug 1219975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850745" comment="wpa_supplicant-2.9-150000.4.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52340</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219296">SUSE bug 1219296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52356</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017992.html" source="SUSE-SU"/>
    <description>
    A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219213">SUSE bug 1219213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848747" comment="libtiff5-4.0.9-150000.45.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52425</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036667.html" source="SUSE-SU"/>
    <description>
    libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853566" comment="libexpat1-2.4.4-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52429</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52439</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio: Fix use-after-free in uio_open

core-1				core-2
-------------------------------------------------------
uio_unregister_device		uio_open
				idev = idr_find()
device_unregister(&amp;idev-&gt;dev)
put_device(&amp;idev-&gt;dev)
uio_device_release
				get_device(&amp;idev-&gt;dev)
kfree(idev)
uio_free_minor(minor)
				uio_release
				put_device(&amp;idev-&gt;dev)
				kfree(idev)
-------------------------------------------------------

In the core-1 uio_unregister_device(), the device_unregister will kfree
idev when the idev-&gt;dev kobject ref is 1. But after core-1
device_unregister, put_device and before doing kfree, the core-2 may
get_device. Then:
1. After core-1 kfree idev, the core-2 will do use-after-free for idev.
2. When core-2 do uio_release and put_device, the idev will be double
   freed.

To address this issue, we can get idev atomic &amp; inc idev reference with
minor_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52443</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

apparmor: avoid crash when parsed profile name is empty

When processing a packed profile in unpack_profile() described like

 "profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}"

a string ":samba-dcerpcd" is unpacked as a fully-qualified name and then
passed to aa_splitn_fqname().

aa_splitn_fqname() treats ":samba-dcerpcd" as only containing a namespace.
Thus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later
aa_alloc_profile() crashes as the new profile name is NULL now.

general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
RIP: 0010:strlen+0x1e/0xa0
Call Trace:
 &lt;TASK&gt;
 ? strlen+0x1e/0xa0
 aa_policy_init+0x1bb/0x230
 aa_alloc_profile+0xb1/0x480
 unpack_profile+0x3bc/0x4960
 aa_unpack+0x309/0x15e0
 aa_replace_profiles+0x213/0x33c0
 policy_update+0x261/0x370
 profile_replace+0x20e/0x2a0
 vfs_write+0x2af/0xe00
 ksys_write+0x126/0x250
 do_syscall_64+0x46/0xf0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---
RIP: 0010:strlen+0x1e/0xa0

It seems such behaviour of aa_splitn_fqname() is expected and checked in
other places where it is called (e.g. aa_remove_profiles). Well, there
is an explicit comment "a ns name without a following profile is allowed"
inside.

AFAICS, nothing can prevent unpacked "name" to be in form like
":samba-dcerpcd" - it is passed from userspace.

Deny the whole profile set replacement in such case and inform user with
EPROTO and an explaining message.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52445</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pvrusb2: fix use after free on context disconnection

Upon module load, a kthread is created targeting the
pvr2_context_thread_func function, which may call pvr2_context_destroy
and thus call kfree() on the context object. However, that might happen
before the usb hub_event handler is able to notify the driver. This
patch adds a sanity check before the invalid read reported by syzbot,
within the context disconnection call stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220315">SUSE bug 1220315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52447</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Defer the free of inner map when necessary

When updating or deleting an inner map in map array or map htab, the map
may still be accessed by non-sleepable program or sleepable program.
However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map
directly through bpf_map_put(), if the ref-counter is the last one
(which is true for most cases), the inner map will be freed by
ops-&gt;map_free() in a kworker. But for now, most .map_free() callbacks
don't use synchronize_rcu() or its variants to wait for the elapse of a
RCU grace period, so after the invocation of ops-&gt;map_free completes,
the bpf program which is accessing the inner map may incur
use-after-free problem.

Fix the free of inner map by invoking bpf_map_free_deferred() after both
one RCU grace period and one tasks trace RCU grace period if the inner
map has been removed from the outer map before. The deferment is
accomplished by using call_rcu() or call_rcu_tasks_trace() when
releasing the last ref-counter of bpf map. The newly-added rcu_head
field in bpf_map shares the same storage space with work field to
reduce the size of bpf_map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52448</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump

Syzkaller has reported a NULL pointer dereference when accessing
rgd-&gt;rd_rgl in gfs2_rgrp_dump().  This can happen when creating
rgd-&gt;rd_gl fails in read_rindex_entry().  Add a NULL pointer check in
gfs2_rgrp_dump() to prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52449</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: Fix gluebi NULL pointer dereference caused by ftl notifier

If both ftl.ko and gluebi.ko are loaded, the notifier of ftl
triggers NULL pointer dereference when trying to access
'gluebi-&gt;desc' in gluebi_read().

ubi_gluebi_init
  ubi_register_volume_notifier
    ubi_enumerate_volumes
      ubi_notify_all
        gluebi_notify    nb-&gt;notifier_call()
          gluebi_create
            mtd_device_register
              mtd_device_parse_register
                add_mtd_device
                  blktrans_notify_add   not-&gt;add()
                    ftl_add_mtd         tr-&gt;add_mtd()
                      scan_header
                        mtd_read
                          mtd_read_oob
                            mtd_read_oob_std
                              gluebi_read   mtd-&gt;read()
                                gluebi-&gt;desc - NULL

Detailed reproduction information available at the Link [1],

In the normal case, obtain gluebi-&gt;desc in the gluebi_get_device(),
and access gluebi-&gt;desc in the gluebi_read(). However,
gluebi_get_device() is not executed in advance in the
ftl_add_mtd() process, which leads to NULL pointer dereference.

The solution for the gluebi module is to run jffs2 on the UBI
volume without considering working with ftl or mtdblock [2].
Therefore, this problem can be avoided by preventing gluebi from
creating the mtdblock device after creating mtd partition of the
type MTD_UBIVOLUME.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()

Get logical socket id instead of physical id in discover_upi_topology()
to avoid out-of-bound access on 'upi = &amp;type-&gt;topology[nid][idx];' line
that leads to NULL pointer dereference in upi_fill_topology()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52451</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/memhp: Fix access beyond end of drmem array

dlpar_memory_remove_by_index() may access beyond the bounds of the
drmem lmb array when the LMB lookup fails to match an entry with the
given DRC index. When the search fails, the cursor is left pointing to
&amp;drmem_info-&gt;lmbs[drmem_info-&gt;n_lmbs], which is one element past the
last valid entry in the array. The debug message at the end of the
function then dereferences this pointer:

        pr_debug("Failed to hot-remove memory at %llx\n",
                 lmb-&gt;base_addr);

This was found by inspection and confirmed with KASAN:

  pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658
  Read of size 8 at addr c000000364e97fd0 by task bash/949

  dump_stack_lvl+0xa4/0xfc (unreliable)
  print_report+0x214/0x63c
  kasan_report+0x140/0x2e0
  __asan_load8+0xa8/0xe0
  dlpar_memory+0x298/0x1658
  handle_dlpar_errorlog+0x130/0x1d0
  dlpar_store+0x18c/0x3e0
  kobj_attr_store+0x68/0xa0
  sysfs_kf_write+0xc4/0x110
  kernfs_fop_write_iter+0x26c/0x390
  vfs_write+0x2d4/0x4e0
  ksys_write+0xac/0x1a0
  system_call_exception+0x268/0x530
  system_call_vectored_common+0x15c/0x2ec

  Allocated by task 1:
   kasan_save_stack+0x48/0x80
   kasan_set_track+0x34/0x50
   kasan_save_alloc_info+0x34/0x50
   __kasan_kmalloc+0xd0/0x120
   __kmalloc+0x8c/0x320
   kmalloc_array.constprop.0+0x48/0x5c
   drmem_init+0x2a0/0x41c
   do_one_initcall+0xe0/0x5c0
   kernel_init_freeable+0x4ec/0x5a0
   kernel_init+0x30/0x1e0
   ret_from_kernel_user_thread+0x14/0x1c

  The buggy address belongs to the object at c000000364e80000
   which belongs to the cache kmalloc-128k of size 131072
  The buggy address is located 0 bytes to the right of
   allocated 98256-byte region [c000000364e80000, c000000364e97fd0)

  ==================================================================
  pseries-hotplug-mem: Failed to hot-remove memory at 0

Log failed lookups with a separate message and dereference the
cursor only when it points to a valid entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52452</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52452" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix accesses to uninit stack slots

Privileged programs are supposed to be able to read uninitialized stack
memory (ever since 6715df8d5) but, before this patch, these accesses
were permitted inconsistently. In particular, accesses were permitted
above state-&gt;allocated_stack, but not below it. In other words, if the
stack was already "large enough", the access was permitted, but
otherwise the access was rejected instead of being allowed to "grow the
stack". This undesired rejection was happening in two places:
- in check_stack_slot_within_bounds()
- in check_stack_range_initialized()
This patch arranges for these accesses to be permitted. A bunch of tests
that were relying on the old rejection had to change; all of them were
changed to add also run unprivileged, in which case the old behavior
persists. One tests couldn't be updated - global_func16 - because it
can't run unprivileged for other reasons.

This patch also fixes the tracking of the stack size for variable-offset
reads. This second fix is bundled in the same commit as the first one
because they're inter-related. Before this patch, writes to the stack
using registers containing a variable offset (as opposed to registers
with fixed, known values) were not properly contributing to the
function's needed stack size. As a result, it was possible for a program
to verify, but then to attempt to read out-of-bounds data at runtime
because a too small stack had been allocated for it.

Each function tracks the size of the stack it needs in
bpf_subprog_info.stack_depth, which is maintained by
update_stack_depth(). For regular memory accesses, check_mem_access()
was calling update_state_depth() but it was passing in only the fixed
part of the offset register, ignoring the variable offset. This was
incorrect; the minimum possible value of that register should be used
instead.

This tracking is now fixed by centralizing the tracking of stack size in
grow_stack_state(), and by lifting the calls to grow_stack_state() to
check_stack_access_within_bounds() as suggested by Andrii. The code is
now simpler and more convincingly tracks the correct maximum stack size.
check_stack_range_initialized() can now rely on enough stack having been
allocated for the access; this helps with the fix for the first issue.

A few tests were changed to also check the stack depth computation. The
one that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length

If the host sends an H2CData command with an invalid DATAL,
the kernel may crash in nvmet_tcp_build_pdu_iovec().

Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
lr : nvmet_tcp_io_work+0x6ac/0x718 [nvmet_tcp]
Call trace:
  process_one_work+0x174/0x3c8
  worker_thread+0x2d0/0x3e8
  kthread+0x104/0x110

Fix the bug by raising a fatal error if DATAL isn't coherent
with the packet size.
Also, the PDU length should never exceed the MAXH2CDATA parameter which
has been communicated to the host in nvmet_tcp_handle_icreq().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52456</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: imx: fix tx statemachine deadlock

When using the serial port as RS485 port, the tx statemachine is used to
control the RTS pin to drive the RS485 transceiver TX_EN pin. When the
TTY port is closed in the middle of a transmission (for instance during
userland application crash), imx_uart_shutdown disables the interface
and disables the Transmission Complete interrupt. afer that,
imx_uart_stop_tx bails on an incomplete transmission, to be retriggered
by the TC interrupt. This interrupt is disabled and therefore the tx
statemachine never transitions out of SEND. The statemachine is in
deadlock now, and the TX_EN remains low, making the interface useless.

imx_uart_stop_tx now checks for incomplete transmission AND whether TC
interrupts are enabled before bailing to be retriggered. This makes sure
the state machine handling is reached, and is properly set to
WAIT_AFTER_SEND.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-02"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52457</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed

Returning an error code from .remove() makes the driver core emit the
little helpful error message:

	remove callback returned a non-zero value. This will be ignored.

and then remove the device anyhow. So all resources that were not freed
are leaked in this case. Skipping serial8250_unregister_port() has the
potential to keep enough of the UART around to trigger a use-after-free.

So replace the error return (and with it the little helpful error
message) by a more useful error message and continue to cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52463</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: force RO when remounting if SetVariable is not supported

If SetVariable at runtime is not supported by the firmware we never assign
a callback for that function. At the same time mount the efivarfs as
RO so no one can call that.  However, we never check the permission flags
when someone remounts the filesystem as RW. As a result this leads to a
crash looking like this:

$ mount -o remount,rw /sys/firmware/efi/efivars
$ efi-updatevar -f PK.auth PK

[  303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  303.280482] Mem abort info:
[  303.280854]   ESR = 0x0000000086000004
[  303.281338]   EC = 0x21: IABT (current EL), IL = 32 bits
[  303.282016]   SET = 0, FnV = 0
[  303.282414]   EA = 0, S1PTW = 0
[  303.282821]   FSC = 0x04: level 0 translation fault
[  303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000
[  303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
[  303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6
[  303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1
[  303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023
[  303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  303.292123] pc : 0x0
[  303.292443] lr : efivar_set_variable_locked+0x74/0xec
[  303.293156] sp : ffff800008673c10
[  303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000
[  303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027
[  303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000
[  303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000
[  303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54
[  303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4
[  303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002
[  303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201
[  303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc
[  303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000
[  303.303341] Call trace:
[  303.303679]  0x0
[  303.303938]  efivar_entry_set_get_size+0x98/0x16c
[  303.304585]  efivarfs_file_write+0xd0/0x1a4
[  303.305148]  vfs_write+0xc4/0x2e4
[  303.305601]  ksys_write+0x70/0x104
[  303.306073]  __arm64_sys_write+0x1c/0x28
[  303.306622]  invoke_syscall+0x48/0x114
[  303.307156]  el0_svc_common.constprop.0+0x44/0xec
[  303.307803]  do_el0_svc+0x38/0x98
[  303.308268]  el0_svc+0x2c/0x84
[  303.308702]  el0t_64_sync_handler+0xf4/0x120
[  303.309293]  el0t_64_sync+0x190/0x194
[  303.309794] Code: ???????? ???????? ???????? ???????? (????????)
[  303.310612] ---[ end trace 0000000000000000 ]---

Fix this by adding a .reconfigure() function to the fs operations which
we can use to check the requested flags and deny anything that's not RO
if the firmware doesn't implement SetVariable at runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/thunderx: Fix possible out-of-bounds string access

Enabling -Wstringop-overflow globally exposes a warning for a common bug
in the usage of strncat():

  drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr':
  drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=]
   1136 |                 strncat(msg, other, OCX_MESSAGE_SIZE);
        |                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   ...
   1145 |                                 strncat(msg, other, OCX_MESSAGE_SIZE);
   ...
   1150 |                                 strncat(msg, other, OCX_MESSAGE_SIZE);

   ...

Apparently the author of this driver expected strncat() to behave the
way that strlcat() does, which uses the size of the destination buffer
as its third argument rather than the length of the source buffer. The
result is that there is no check on the size of the allocated buffer.

Change it to strlcat().

  [ bp: Trim compiler output, fixup commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52467</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: syscon: Fix null pointer dereference in of_syscon_register()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/amd/pm: fix a use-after-free in kv_parse_power_table

When ps allocated by kzalloc equals to NULL, kv_parse_power_table
frees adev-&gt;pm.dpm.ps that allocated before. However, after the control
flow goes through the following call chains:

kv_parse_power_table
  |-&gt; kv_dpm_init
        |-&gt; kv_dpm_sw_init
	      |-&gt; kv_dpm_fini

The adev-&gt;pm.dpm.ps is used in the for loop of kv_dpm_fini after its
first free in kv_parse_power_table and causes a use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52470</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()

check the alloc_workqueue return value in radeon_crtc_init()
to avoid null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52474</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests

hfi1 user SDMA request processing has two bugs that can cause data
corruption for user SDMA requests that have multiple payload iovecs
where an iovec other than the tail iovec does not run up to the page
boundary for the buffer pointed to by that iovec.a

Here are the specific bugs:
1. user_sdma_txadd() does not use struct user_sdma_iovec-&gt;iov.iov_len.
   Rather, user_sdma_txadd() will add up to PAGE_SIZE bytes from iovec
   to the packet, even if some of those bytes are past
   iovec-&gt;iov.iov_len and are thus not intended to be in the packet.
2. user_sdma_txadd() and user_sdma_send_pkts() fail to advance to the
   next iovec in user_sdma_request-&gt;iovs when the current iovec
   is not PAGE_SIZE and does not contain enough data to complete the
   packet. The transmitted packet will contain the wrong data from the
   iovec pages.

This has not been an issue with SDMA packets from hfi1 Verbs or PSM2
because they only produce iovecs that end short of PAGE_SIZE as the tail
iovec of an SDMA request.

Fixing these bugs exposes other bugs with the SDMA pin cache
(struct mmu_rb_handler) that get in way of supporting user SDMA requests
with multiple payload iovecs whose buffers do not end at PAGE_SIZE. So
this commit fixes those issues as well.

Here are the mmu_rb_handler bugs that non-PAGE_SIZE-end multi-iovec
payload user SDMA requests can hit:
1. Overlapping memory ranges in mmu_rb_handler will result in duplicate
   pinnings.
2. When extending an existing mmu_rb_handler entry (struct mmu_rb_node),
   the mmu_rb code (1) removes the existing entry under a lock, (2)
   releases that lock, pins the new pages, (3) then reacquires the lock
   to insert the extended mmu_rb_node.

   If someone else comes in and inserts an overlapping entry between (2)
   and (3), insert in (3) will fail.

   The failure path code in this case unpins _all_ pages in either the
   original mmu_rb_node or the new mmu_rb_node that was inserted between
   (2) and (3).
3. In hfi1_mmu_rb_remove_unless_exact(), mmu_rb_node-&gt;refcount is
   incremented outside of mmu_rb_handler-&gt;lock. As a result, mmu_rb_node
   could be evicted by another thread that gets mmu_rb_handler-&gt;lock and
   checks mmu_rb_node-&gt;refcount before mmu_rb_node-&gt;refcount is
   incremented.
4. Related to #2 above, SDMA request submission failure path does not
   check mmu_rb_node-&gt;refcount before freeing mmu_rb_node object.

   If there are other SDMA requests in progress whose iovecs have
   pointers to the now-freed mmu_rb_node(s), those pointers to the
   now-freed mmu_rb nodes will be dereferenced when those SDMA requests
   complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52475</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: powermate - fix use-after-free in powermate_config_complete

syzbot has found a use-after-free bug [1] in the powermate driver. This
happens when the device is disconnected, which leads to a memory free from
the powermate_device struct.  When an asynchronous control message
completes after the kfree and its callback is invoked, the lock does not
exist anymore and hence the bug.

Use usb_kill_urb() on pm-&gt;config to cancel any in-progress requests upon
device disconnection.

[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52476</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/lbr: Filter vsyscall addresses

We found that a panic can occur when a vsyscall is made while LBR sampling
is active. If the vsyscall is interrupted (NMI) for perf sampling, this
call sequence can occur (most recent at top):

    __insn_get_emulate_prefix()
    insn_get_emulate_prefix()
    insn_get_prefixes()
    insn_get_opcode()
    decode_branch_type()
    get_branch_type()
    intel_pmu_lbr_filter()
    intel_pmu_handle_irq()
    perf_event_nmi_handler()

Within __insn_get_emulate_prefix() at frame 0, a macro is called:

    peek_nbyte_next(insn_byte_t, insn, i)

Within this macro, this dereference occurs:

    (insn)-&gt;next_byte

Inspecting registers at this point, the value of the next_byte field is the
address of the vsyscall made, for example the location of the vsyscall
version of gettimeofday() at 0xffffffffff600000. The access to an address
in the vsyscall region will trigger an oops due to an unhandled page fault.

To fix the bug, filtering for vsyscalls can be done when
determining the branch type. This patch will return
a "none" branch if a kernel address if found to lie in the
vsyscall region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52477</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: hub: Guard against accesses to uninitialized BOS descriptors

Many functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h
access fields inside udev-&gt;bos without checking if it was allocated and
initialized. If usb_get_bos_descriptor() fails for whatever
reason, udev-&gt;bos will be NULL and those accesses will result in a
crash:

BUG: kernel NULL pointer dereference, address: 0000000000000018
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 5 PID: 17818 Comm: kworker/5:1 Tainted: G W 5.15.108-18910-gab0e1cb584e1 #1 &lt;HASH:1f9e 1&gt;
Hardware name: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 02/03/2021
Workqueue: usb_hub_wq hub_event
RIP: 0010:hub_port_reset+0x193/0x788
Code: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 &lt;48&gt; 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9
RSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310
RDX: fffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840
RBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffffab740c53fd3e R14: 0000000000000032 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffffa1be96540000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0
Call Trace:
hub_event+0x73f/0x156e
? hub_activate+0x5b7/0x68f
process_one_work+0x1a2/0x487
worker_thread+0x11a/0x288
kthread+0x13a/0x152
? process_one_work+0x487/0x487
? kthread_associate_blkcg+0x70/0x70
ret_from_fork+0x1f/0x30

Fall back to a default behavior if the BOS descriptor isn't accessible
and skip all the functionalities that depend on it: LPM support checks,
Super Speed capabilitiy checks, U1/U2 states setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52478</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect

hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.

hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.

This opens the following races (note the below code is simplified):

1. Retrieving + printing the protocol (harmless race):

	if (!hidpp-&gt;protocol_major) {
		hidpp_root_get_protocol_version()
		hidpp-&gt;protocol_major = response.rap.params[0];
	}

We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:

[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.

Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:

2. Updating the name to the HIDPP name (harmless race):

	if (hidpp-&gt;name == hdev-&gt;name) {
		...
		hidpp-&gt;name = new_name;
	}

3. Initializing the power_supply class for the battery (problematic!):

hidpp_initialize_battery()
{
        if (hidpp-&gt;battery.ps)
                return 0;

	probe_battery(); /* Blocks, threads take turns executing this */

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);
}

4. Creating delayed input_device (potentially problematic):

	if (hidpp-&gt;delayed_input)
		return;

	hidpp-&gt;delayed_input = hidpp_allocate_input(hdev);

The really big problem here is 3. Hitting the race leads to the following
sequence:

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

	...

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.

Notice how:

1. This is all devm-maganaged
2. The hidpp-&gt;battery.desc struct is shared between the 2 power supplies
3. hidpp-&gt;battery.desc.properties points to the result from the second
   devm_kmemdup()

This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
   hidpp-&gt;battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
   this involves sending a remove uevent to userspace which invokes
   power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp-&gt;battery.desc.properties which
   now points to freed memory leading to backtraces like this one:

Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel:  ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel:  dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel:  kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52482</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/srso: Add SRSO mitigation for Hygon processors

Add mitigation for the speculative return stack overflow vulnerability
which exists on Hygon processors too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range

When running an SVA case, the following soft lockup is triggered:
--------------------------------------------------------------------
watchdog: BUG: soft lockup - CPU#244 stuck for 26s!
pstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50
lr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50
sp : ffff8000d83ef290
x29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000
x26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000
x23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0
x20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0
x14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a
x2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001
Call trace:
 arm_smmu_cmdq_issue_cmdlist+0x178/0xa50
 __arm_smmu_tlb_inv_range+0x118/0x254
 arm_smmu_tlb_inv_range_asid+0x6c/0x130
 arm_smmu_mm_invalidate_range+0xa0/0xa4
 __mmu_notifier_invalidate_range_end+0x88/0x120
 unmap_vmas+0x194/0x1e0
 unmap_region+0xb4/0x144
 do_mas_align_munmap+0x290/0x490
 do_mas_munmap+0xbc/0x124
 __vm_munmap+0xa8/0x19c
 __arm64_sys_munmap+0x28/0x50
 invoke_syscall+0x78/0x11c
 el0_svc_common.constprop.0+0x58/0x1c0
 do_el0_svc+0x34/0x60
 el0_svc+0x2c/0xd4
 el0t_64_sync_handler+0x114/0x140
 el0t_64_sync+0x1a4/0x1a8
--------------------------------------------------------------------

Note that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed
to "arm_smmu_mm_arch_invalidate_secondary_tlbs", yet the problem remains.

The commit 06ff87bae8d3 ("arm64: mm: remove unused functions and variable
protoypes") fixed a similar lockup on the CPU MMU side. Yet, it can occur
to SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called
typically next to MMU tlb flush function, e.g.
	tlb_flush_mmu_tlbonly {
		tlb_flush {
			__flush_tlb_range {
				// check MAX_TLBI_OPS
			}
		}
		mmu_notifier_arch_invalidate_secondary_tlbs {
			arm_smmu_mm_arch_invalidate_secondary_tlbs {
				// does not check MAX_TLBI_OPS
			}
		}
	}

Clone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an
SVA case SMMU uses the CPU page table, so it makes sense to align with the
tlbflush code. Then, replace per-page TLBI commands with a single per-asid
TLBI command, if the request size hits this threshold.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52492</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fix NULL pointer in channel unregistration function

__dma_async_device_channel_register() can fail. In case of failure,
chan-&gt;local is freed (with free_percpu()), and chan-&gt;local is nullified.
When dma_async_device_unregister() is called (because of managed API or
intentionally by DMA controller driver), channels are unconditionally
unregistered, leading to this NULL pointer:
[    1.318693] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0
[...]
[    1.484499] Call trace:
[    1.486930]  device_del+0x40/0x394
[    1.490314]  device_unregister+0x20/0x7c
[    1.494220]  __dma_async_device_channel_unregister+0x68/0xc0

Look at dma_async_device_register() function error path, channel device
unregistration is done only if chan-&gt;local is not NULL.

Then add the same condition at the beginning of
__dma_async_device_channel_unregister() function, to avoid NULL pointer
issue whatever the API used to reach this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52497</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix lz4 inplace decompression

Currently EROFS can map another compressed buffer for inplace
decompression, that was used to handle the cases that some pages of
compressed data are actually not in-place I/O.

However, like most simple LZ77 algorithms, LZ4 expects the compressed
data is arranged at the end of the decompressed buffer and it
explicitly uses memmove() to handle overlapping:
  __________________________________________________________
 |_ direction of decompression --&gt; ____ |_ compressed data _|

Although EROFS arranges compressed data like this, it typically maps two
individual virtual buffers so the relative order is uncertain.
Previously, it was hardly observed since LZ4 only uses memmove() for
short overlapped literals and x86/arm64 memmove implementations seem to
completely cover it up and they don't have this issue.  Juhyung reported
that EROFS data corruption can be found on a new Intel x86 processor.
After some analysis, it seems that recent x86 processors with the new
FSRM feature expose this issue with "rep movsb".

Let's strictly use the decompressed buffer for lz4 inplace
decompression for now.  Later, as an useful improvement, we could try
to tie up these two buffers together in the correct order.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52500</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command

Tags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed
when we receive the response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52501</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52501" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not attempt to read past "commit"

When iterating over the ring buffer while the ring buffer is active, the
writer can corrupt the reader. There's barriers to help detect this and
handle it, but that code missed the case where the last event was at the
very end of the page and has only 4 bytes left.

The checks to detect the corruption by the writer to reads needs to see the
length of the event. If the length in the first 4 bytes is zero then the
length is stored in the second 4 bytes. But if the writer is in the process
of updating that code, there's a small window where the length in the first
4 bytes could be zero even though the length is only 4 bytes. That will
cause rb_event_length() to read the next 4 bytes which could happen to be off the
allocated page.

To protect against this, fail immediately if the next event pointer is
less than 8 bytes from the end of the commit (last byte of data), as all
events must be a minimum of 8 bytes anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52502</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52502" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()

Sili Luo reported a race in nfc_llcp_sock_get(), leading to UAF.

Getting a reference on the socket found in a lookup while
holding a lock should happen before releasing the lock.

nfc_llcp_sock_get_sn() has a similar problem.

Finally nfc_llcp_recv_snl() needs to make sure the socket
found by nfc_llcp_sock_from_sn() does not disappear.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220832">SUSE bug 1220832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52504</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52504" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/alternatives: Disable KASAN in apply_alternatives()

Fei has reported that KASAN triggers during apply_alternatives() on
a 5-level paging machine:

	BUG: KASAN: out-of-bounds in rcu_is_watching()
	Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0
	...
	__asan_load4()
	rcu_is_watching()
	trace_hardirqs_on()
	text_poke_early()
	apply_alternatives()
	...

On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57)
gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on
__VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled().

KASAN gets confused when apply_alternatives() patches the
KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START
static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue.

Fix it for real by disabling KASAN while the kernel is patching alternatives.

[ mingo: updated the changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52507" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: assert requested protocol is valid

The protocol is used in a bit mask to determine if the protocol is
supported. Assert the provided protocol is less than the maximum
defined so it doesn't potentially perform a shift-out-of-bounds and
provide a clearer error for undefined protocols vs unsupported ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52508</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52508" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()

The nvme_fc_fcp_op structure describing an AEN operation is initialized with a
null request structure pointer. An FC LLDD may make a call to
nvme_fc_io_getuuid passing a pointer to an nvmefc_fcp_req for an AEN operation.

Add validation of the request structure pointer before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52509</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ravb: Fix use-after-free issue in ravb_tx_timeout_work()

The ravb_stop() should call cancel_work_sync(). Otherwise,
ravb_tx_timeout_work() is possible to use the freed priv after
ravb_remove() was called like below:

CPU0			CPU1
			ravb_tx_timeout()
ravb_remove()
unregister_netdev()
free_netdev(ndev)
// free priv
			ravb_tx_timeout_work()
			// use priv

unregister_netdev() will call .ndo_stop() so that ravb_stop() is
called. And, after phy_stop() is called, netif_carrier_off()
is also called. So that .ndo_tx_timeout() will not be called
after phy_stop().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223290">SUSE bug 1223290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52510</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52510" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ieee802154: ca8210: Fix a potential UAF in ca8210_probe

If of_clk_add_provider() fails in ca8210_register_ext_clock(),
it calls clk_unregister() to release priv-&gt;clk and returns an
error. However, the caller ca8210_probe() then calls ca8210_remove(),
where priv-&gt;clk is freed again in ca8210_unregister_ext_clock(). In
this case, a use-after-free may happen in the second time we call
clk_unregister().

Fix this by removing the first clk_unregister(). Also, priv-&gt;clk could
be an error code on failure of clk_register_fixed_rate(). Use
IS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52511</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52511" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: sun6i: reduce DMA RX transfer width to single byte

Through empirical testing it has been determined that sometimes RX SPI
transfers with DMA enabled return corrupted data. This is down to single
or even multiple bytes lost during DMA transfer from SPI peripheral to
memory. It seems the RX FIFO within the SPI peripheral can become
confused when performing bus read accesses wider than a single byte to it
during an active SPI transfer.

This patch reduces the width of individual DMA read accesses to the
RX FIFO to a single byte to mitigate that issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix connection failure handling

In case immediate MPA request processing fails, the newly
created endpoint unlinks the listening endpoint and is
ready to be dropped. This special case was not handled
correctly by the code handling the later TCP socket close,
causing a NULL dereference crash in siw_cm_work_handler()
when dereferencing a NULL listener. We now also cancel
the useless MPA timeout, if immediate MPA request
processing fails.

This patch furthermore simplifies MPA processing in general:
Scheduling a useless TCP socket read in sk_data_ready() upcall
is now surpressed, if the socket is already moved out of
TCP_ESTABLISHED state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52515</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Do not call scsi_done() from srp_abort()

After scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler
callback, it performs one of the following actions:
* Call scsi_queue_insert().
* Call scsi_finish_command().
* Call scsi_eh_scmd_add().
Hence, SCSI abort handlers must not call scsi_done(). Otherwise all
the above actions would trigger a use-after-free. Hence remove the
scsi_done() call from srp_abort(). Keep the srp_free_req() call
before returning SUCCESS because we may not see the command again if
SUCCESS is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52517</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain

Previously the transfer complete IRQ immediately drained to RX FIFO to
read any data remaining in FIFO to the RX buffer. This behaviour is
correct when dealing with SPI in interrupt mode. However in DMA mode the
transfer complete interrupt still fires as soon as all bytes to be
transferred have been stored in the FIFO. At that point data in the FIFO
still needs to be picked up by the DMA engine. Thus the drain procedure
and DMA engine end up racing to read from RX FIFO, corrupting any data
read. Additionally the RX buffer pointer is never adjusted according to
DMA progress in DMA mode, thus calling the RX FIFO drain procedure in DMA
mode is a bug.
Fix corruptions in DMA RX mode by draining RX FIFO only in interrupt mode.
Also wait for completion of RX DMA when in DMA mode before returning to
ensure all data has been copied to the supplied memory buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52519</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit

The EHL (Elkhart Lake) based platforms provide a OOB (Out of band)
service, which allows to wakup device when the system is in S5 (Soft-Off
state). This OOB service can be enabled/disabled from BIOS settings. When
enabled, the ISH device gets PME wake capability. To enable PME wakeup,
driver also needs to enable ACPI GPE bit.

On resume, BIOS will clear the wakeup bit. So driver need to re-enable it
in resume function to keep the next wakeup capability. But this BIOS
clearing of wakeup bit doesn't decrement internal OS GPE reference count,
so this reenabling on every resume will cause reference count to overflow.

So first disable and reenable ACPI GPE bit using acpi_disable_gpe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52520" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix reference leak

If a duplicate attribute is found using kset_find_obj(), a reference
to that attribute is returned which needs to be disposed accordingly
using kobject_put(). Move the setting name validation into a separate
function to allow for this change without having to duplicate the
cleanup code for this setting.
As a side note, a very similar bug was fixed in
commit 7295a996fdab ("platform/x86: dell-sysman: Fix reference leak"),
so it seems that the bug was copied from that driver.

Compile-tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52523</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52523" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets

With a SOCKMAP/SOCKHASH map and an sk_msg program user can steer messages
sent from one TCP socket (s1) to actually egress from another TCP
socket (s2):

tcp_bpf_sendmsg(s1)		// = sk_prot-&gt;sendmsg
  tcp_bpf_send_verdict(s1)	// __SK_REDIRECT case
    tcp_bpf_sendmsg_redir(s2)
      tcp_bpf_push_locked(s2)
	tcp_bpf_push(s2)
	  tcp_rate_check_app_limited(s2) // expects tcp_sock
	  tcp_sendmsg_locked(s2)	 // ditto

There is a hard-coded assumption in the call-chain, that the egress
socket (s2) is a TCP socket.

However in commit 122e6c79efe1 ("sock_map: Update sock type checks for
UDP") we have enabled redirects to non-TCP sockets. This was done for the
sake of BPF sk_skb programs. There was no indention to support sk_msg
send-to-egress use case.

As a result, attempts to send-to-egress through a non-TCP socket lead to a
crash due to invalid downcast from sock to tcp_sock:

 BUG: kernel NULL pointer dereference, address: 000000000000002f
 ...
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x60/0x70
  ? __die+0x1f/0x70
  ? page_fault_oops+0x80/0x160
  ? do_user_addr_fault+0x2d7/0x800
  ? rcu_is_watching+0x11/0x50
  ? exc_page_fault+0x70/0x1c0
  ? asm_exc_page_fault+0x27/0x30
  ? tcp_tso_segs+0x14/0xa0
  tcp_write_xmit+0x67/0xce0
  __tcp_push_pending_frames+0x32/0xf0
  tcp_push+0x107/0x140
  tcp_sendmsg_locked+0x99f/0xbb0
  tcp_bpf_push+0x19d/0x3a0
  tcp_bpf_sendmsg_redir+0x55/0xd0
  tcp_bpf_send_verdict+0x407/0x550
  tcp_bpf_sendmsg+0x1a1/0x390
  inet_sendmsg+0x6a/0x70
  sock_sendmsg+0x9d/0xc0
  ? sockfd_lookup_light+0x12/0x80
  __sys_sendto+0x10e/0x160
  ? syscall_enter_from_user_mode+0x20/0x60
  ? __this_cpu_preempt_check+0x13/0x20
  ? lockdep_hardirqs_on+0x82/0x110
  __x64_sys_sendto+0x1f/0x30
  do_syscall_64+0x38/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Reject selecting a non-TCP sockets as redirect target from a BPF sk_msg
program to prevent the crash. When attempted, user will receive an EACCES
error from send/sendto/sendmsg() syscall.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52524</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: llcp: Add lock when modifying device list

The device list needs its associated lock held when modifying it, or the
list could become corrupted, as syzbot discovered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52525</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52525" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet

Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52528</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg

syzbot reported the following uninit-value access issue:

=====================================================
BUG: KMSAN: uninit-value in smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]
BUG: KMSAN: uninit-value in smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482
CPU: 0 PID: 8696 Comm: kworker/0:3 Not tainted 5.8.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: usb_hub_wq hub_event
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x21c/0x280 lib/dump_stack.c:118
 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:121
 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]
 smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482
 usbnet_probe+0x1152/0x3f90 drivers/net/usb/usbnet.c:1737
 usb_probe_interface+0xece/0x1550 drivers/usb/core/driver.c:374
 really_probe+0xf20/0x20b0 drivers/base/dd.c:529
 driver_probe_device+0x293/0x390 drivers/base/dd.c:701
 __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807
 bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431
 __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873
 device_initial_probe+0x4a/0x60 drivers/base/dd.c:920
 bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491
 device_add+0x3b0e/0x40d0 drivers/base/core.c:2680
 usb_set_configuration+0x380f/0x3f10 drivers/usb/core/message.c:2032
 usb_generic_driver_probe+0x138/0x300 drivers/usb/core/generic.c:241
 usb_probe_device+0x311/0x490 drivers/usb/core/driver.c:272
 really_probe+0xf20/0x20b0 drivers/base/dd.c:529
 driver_probe_device+0x293/0x390 drivers/base/dd.c:701
 __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807
 bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431
 __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873
 device_initial_probe+0x4a/0x60 drivers/base/dd.c:920
 bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491
 device_add+0x3b0e/0x40d0 drivers/base/core.c:2680
 usb_new_device+0x1bd4/0x2a30 drivers/usb/core/hub.c:2554
 hub_port_connect drivers/usb/core/hub.c:5208 [inline]
 hub_port_connect_change drivers/usb/core/hub.c:5348 [inline]
 port_event drivers/usb/core/hub.c:5494 [inline]
 hub_event+0x5e7b/0x8a70 drivers/usb/core/hub.c:5576
 process_one_work+0x1688/0x2140 kernel/workqueue.c:2269
 worker_thread+0x10bc/0x2730 kernel/workqueue.c:2415
 kthread+0x551/0x590 kernel/kthread.c:292
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293

Local variable ----buf.i87@smsc75xx_bind created at:
 __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]
 smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482
 __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]
 smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482

This issue is caused because usbnet_read_cmd() reads less bytes than requested
(zero byte in the reproducer). In this case, 'buf' is not properly filled.

This patch fixes the issue by returning -ENODATA if usbnet_read_cmd() reads
less bytes than requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52529</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52529" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: sony: Fix a potential memory leak in sony_probe()

If an error occurs after a successful usb_alloc_urb() call, usb_free_urb()
should be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52530</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix potential key use-after-free

When ieee80211_key_link() is called by ieee80211_gtk_rekey_add()
but returns 0 due to KRACK protection (identical key reinstall),
ieee80211_gtk_rekey_add() will still return a pointer into the
key, in a potential use-after-free. This normally doesn't happen
since it's only called by iwlwifi in case of WoWLAN rekey offload
which has its own KRACK protection, but still better to fix, do
that by returning an error code and converting that to success on
the cfg80211 boundary only, leaving the error for bad callers of
ieee80211_gtk_rekey_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix a memory corruption issue

A few lines above, space is kzalloc()'ed for:
	sizeof(struct iwl_nvm_data) +
	sizeof(struct ieee80211_channel) +
	sizeof(struct ieee80211_rate)

'mvm-&gt;nvm_data' is a 'struct iwl_nvm_data', so it is fine.

At the end of this structure, there is the 'channels' flex array.
Each element is of type 'struct ieee80211_channel'.
So only 1 element is allocated in this array.

When doing:
  mvm-&gt;nvm_data-&gt;bands[0].channels = mvm-&gt;nvm_data-&gt;channels;
We point at the first element of the 'channels' flex array.
So this is fine.

However, when doing:
  mvm-&gt;nvm_data-&gt;bands[0].bitrates =
			(void *)((u8 *)mvm-&gt;nvm_data-&gt;channels + 1);
because of the "(u8 *)" cast, we add only 1 to the address of the beginning
of the flex array.

It is likely that we want point at the 'struct ieee80211_rate' allocated
just after.

Remove the spurious casting so that the pointer arithmetic works as
expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52532</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52532" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix TX CQE error handling

For an unknown TX CQE error type (probably from a newer hardware),
still free the SKB, update the queue tail, etc., otherwise the
accounting will be wrong.

Also, TX errors can be triggered by injecting corrupted packets, so
replace the WARN_ONCE to ratelimited error logging.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Avoid memory allocation in iommu_suspend()

The iommu_suspend() syscore suspend callback is invoked with IRQ disabled.
Allocating memory with the GFP_KERNEL flag may re-enable IRQs during
the suspend callback, which can cause intermittent suspend/hibernation
problems with the following kernel traces:

Calling iommu_suspend+0x0/0x1d0
------------[ cut here ]------------
WARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0
...
CPU: 0 PID: 15 Comm: rcu_preempt Tainted: G     U      E      6.3-intel #r1
RIP: 0010:ktime_get+0x9b/0xb0
...
Call Trace:
 &lt;IRQ&gt;
 tick_sched_timer+0x22/0x90
 ? __pfx_tick_sched_timer+0x10/0x10
 __hrtimer_run_queues+0x111/0x2b0
 hrtimer_interrupt+0xfa/0x230
 __sysvec_apic_timer_interrupt+0x63/0x140
 sysvec_apic_timer_interrupt+0x7b/0xa0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1f/0x30
...
------------[ cut here ]------------
Interrupts enabled after iommu_suspend+0x0/0x1d0
WARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270
CPU: 0 PID: 27420 Comm: rtcwake Tainted: G     U  W   E      6.3-intel #r1
RIP: 0010:syscore_suspend+0x147/0x270
...
Call Trace:
 &lt;TASK&gt;
 hibernation_snapshot+0x25b/0x670
 hibernate+0xcd/0x390
 state_store+0xcf/0xe0
 kobj_attr_store+0x13/0x30
 sysfs_kf_write+0x3f/0x50
 kernfs_fop_write_iter+0x128/0x200
 vfs_write+0x1fd/0x3c0
 ksys_write+0x6f/0xf0
 __x64_sys_write+0x1d/0x30
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

Given that only 4 words memory is needed, avoid the memory allocation in
iommu_suspend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52564" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"

This reverts commit 9b9c8195f3f0d74a826077fc1c01b9ee74907239.

The commit above is reverted as it did not solve the original issue.

gsm_cleanup_mux() tries to free up the virtual ttys by calling
gsm_dlci_release() for each available DLCI. There, dlci_put() is called to
decrease the reference counter for the DLCI via tty_port_put() which
finally calls gsm_dlci_free(). This already clears the pointer which is
being checked in gsm_cleanup_mux() before calling gsm_dlci_release().
Therefore, it is not necessary to clear this pointer in gsm_cleanup_mux()
as done in the reverted commit. The commit introduces a null pointer
dereference:
 &lt;TASK&gt;
 ? __die+0x1f/0x70
 ? page_fault_oops+0x156/0x420
 ? search_exception_tables+0x37/0x50
 ? fixup_exception+0x21/0x310
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? tty_port_put+0x19/0xa0
 gsmtty_cleanup+0x29/0x80 [n_gsm]
 release_one_tty+0x37/0xe0
 process_one_work+0x1e6/0x3e0
 worker_thread+0x4c/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe1/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2f/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

The actual issue is that nothing guards dlci_put() from being called
multiple times while the tty driver was triggered but did not yet finished
calling gsm_dlci_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52566" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()

In nilfs_gccache_submit_read_data(), brelse(bh) is called to drop the
reference count of bh when the call to nilfs_dat_translate() fails.  If
the reference count hits 0 and its owner page gets unlocked, bh may be
freed.  However, bh-&gt;b_page is dereferenced to put the page after that,
which may result in a use-after-free bug.  This patch moves the release
operation after unlocking and putting the page.

NOTE: The function in question is only called in GC, and in combination
with current userland tools, address translation using DAT does not occur
in that function, so the code path that causes this issue will not be
executed.  However, it is possible to run that code path by intentionally
modifying the userland GC library or by calling the GC ioctl directly.

[konishi.ryusuke@gmail.com: NOTE added to the commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250_port: Check IRQ data before use

In case the leaf driver wants to use IRQ polling (irq = 0) and
IIR register shows that an interrupt happened in the 8250 hardware
the IRQ data can be NULL. In such a case we need to skip the wake
event as we came to this path from the timer interrupt and quite
likely system is already awake.

Without this fix we have got an Oops:

    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A
    ...
    BUG: kernel NULL pointer dereference, address: 0000000000000010
    RIP: 0010:serial8250_handle_irq+0x7c/0x240
    Call Trace:
     ? serial8250_handle_irq+0x7c/0x240
     ? __pfx_serial8250_timeout+0x10/0x10
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: remove BUG() after failure to insert delayed dir index item

Instead of calling BUG() when we fail to insert a delayed dir index item
into the delayed node's tree, we can just release all the resources we
have allocated/acquired before and return the error to the caller. This is
fine because all existing call chains undo anything they have done before
calling btrfs_insert_delayed_dir_index() or BUG_ON (when creating pending
snapshots in the transaction commit path).

So remove the BUG() call and do proper error handling.

This relates to a syzbot report linked below, but does not fix it because
it only prevents hitting a BUG(), it does not fix the issue where somehow
we attempt to use twice the same index number for different index items.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52574</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: fix null-ptr-deref when team device type is changed

Get a null-ptr-deref bug as follows with reproducer [1].

BUG: kernel NULL pointer dereference, address: 0000000000000228
...
RIP: 0010:vlan_dev_hard_header+0x35/0x140 [8021q]
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x24/0x70
 ? page_fault_oops+0x82/0x150
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? vlan_dev_hard_header+0x35/0x140 [8021q]
 ? vlan_dev_hard_header+0x8e/0x140 [8021q]
 neigh_connected_output+0xb2/0x100
 ip6_finish_output2+0x1cb/0x520
 ? nf_hook_slow+0x43/0xc0
 ? ip6_mtu+0x46/0x80
 ip6_finish_output+0x2a/0xb0
 mld_sendpack+0x18f/0x250
 mld_ifc_work+0x39/0x160
 process_one_work+0x1e6/0x3f0
 worker_thread+0x4d/0x2f0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe5/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30

[1]
$ teamd -t team0 -d -c '{"runner": {"name": "loadbalance"}}'
$ ip link add name t-dummy type dummy
$ ip link add link t-dummy name t-dummy.100 type vlan id 100
$ ip link add name t-nlmon type nlmon
$ ip link set t-nlmon master team0
$ ip link set t-nlmon nomaster
$ ip link set t-dummy up
$ ip link set team0 up
$ ip link set t-dummy.100 down
$ ip link set t-dummy.100 master team0

When enslave a vlan device to team device and team device type is changed
from non-ether to ether, header_ops of team device is changed to
vlan_header_ops. That is incorrect and will trigger null-ptr-deref
for vlan-&gt;real_dev in vlan_dev_hard_header() because team device is not
a vlan device.

Cache eth_header_ops in team_setup(), then assign cached header_ops to
header_ops of team net device when its type is changed from non-ether
to ether to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52575</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52576</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()

The code calling ima_free_kexec_buffer() runs long after the memblock
allocator has already been torn down, potentially resulting in a use
after free in memblock_isolate_range().

With KASAN or KFENCE, this use after free will result in a BUG
from the idle task, and a subsequent kernel panic.

Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid
that bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Only call folio_start_fscache() one time for each folio

If a network filesystem using netfs implements a clamp_length()
function, it can set subrequest lengths smaller than a page size.

When we loop through the folios in netfs_rreq_unlock_folios() to
set any folios to be written back, we need to make sure we only
call folio_start_fscache() once for each folio.

Otherwise, this simple testcase:

  mount -o fsc,rsize=1024,wsize=1024 127.0.0.1:/export /mnt/nfs
  dd if=/dev/zero of=/mnt/nfs/file.bin bs=4096 count=1
  1+0 records in
  1+0 records out
  4096 bytes (4.1 kB, 4.0 KiB) copied, 0.0126359 s, 324 kB/s
  echo 3 &gt; /proc/sys/vm/drop_caches
  cat /mnt/nfs/file.bin &gt; /dev/null

will trigger an oops similar to the following:

  page dumped because: VM_BUG_ON_FOLIO(folio_test_private_2(folio))
  ------------[ cut here ]------------
  kernel BUG at include/linux/netfs.h:44!
  ...
  CPU: 5 PID: 134 Comm: kworker/u16:5 Kdump: loaded Not tainted 6.4.0-rc5
  ...
  RIP: 0010:netfs_rreq_unlock_folios+0x68e/0x730 [netfs]
  ...
  Call Trace:
    netfs_rreq_assess+0x497/0x660 [netfs]
    netfs_subreq_terminated+0x32b/0x610 [netfs]
    nfs_netfs_read_completion+0x14e/0x1a0 [nfs]
    nfs_read_completion+0x2f9/0x330 [nfs]
    rpc_free_task+0x72/0xa0 [sunrpc]
    rpc_async_release+0x46/0x70 [sunrpc]
    process_one_work+0x3bd/0x710
    worker_thread+0x89/0x610
    kthread+0x181/0x1c0
    ret_from_fork+0x29/0x50
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix deadlock or deadcode of misusing dget()

The lock order is incorrect between denty and its parent, we should
always make sure that the parent get the lock first.

But since this deadcode is never used and the parent dir will always
be set from the callers, let's just remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52590</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change ocfs2 rename code to avoid touching renamed directory if
its parent does not change as without locking that can corrupt the
filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

reiserfs: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change reiserfs rename code to avoid touching renamed directory
if its parent does not change as without locking that can corrupt the
filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: fix setting of fpc register

kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
(fpc) register of a guest cpu. The new value is tested for validity by
temporarily loading it into the fpc register.

This may lead to corruption of the fpc register of the host process:
if an interrupt happens while the value is temporarily loaded into the fpc
register, and within interrupt context floating point or vector registers
are used, the current fp/vx registers are saved with save_fpu_regs()
assuming they belong to user space and will be loaded into fp/vx registers
when returning to user space.

test_fp_ctl() restores the original user space / host process fpc register
value, however it will be discarded, when returning to user space.

In result the host process will incorrectly continue to run with the value
that was supposed to be used for a guest cpu.

Fix this by simply removing the test. There is another test right before
the SIE context is entered which will handles invalid values.

This results in a change of behaviour: invalid values will now be accepted
instead of that the ioctl fails with -EINVAL. This seems to be acceptable,
given that this interface is most likely not used anymore, and this is in
addition the same behaviour implemented with the memory mapped interface
(replace invalid values with zero) - see sync_regs() in kvm-s390.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52605</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/mm: Fix null-pointer dereference in pgtable_cache_add

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52616</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init

When the mpi_ec_ctx structure is initialized, some fields are not
cleared, causing a crash when referencing the field when the
structure was released. Initially, this issue was ignored because
memory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.
For example, this error will be triggered when calculating the
Za value for SM2 separately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52621</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52621" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers

These three bpf_map_{lookup,update,delete}_elem() helpers are also
available for sleepable bpf program, so add the corresponding lock
assertion for sleepable bpf program, otherwise the following warning
will be reported when a sleepable bpf program manipulates bpf map under
interpreter mode (aka bpf_jit_enable=0):

  WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......
  CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:bpf_map_lookup_elem+0x54/0x60
  ......
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0xa5/0x240
   ? bpf_map_lookup_elem+0x54/0x60
   ? report_bug+0x1ba/0x1f0
   ? handle_bug+0x40/0x80
   ? exc_invalid_op+0x18/0x50
   ? asm_exc_invalid_op+0x1b/0x20
   ? __pfx_bpf_map_lookup_elem+0x10/0x10
   ? rcu_lockdep_current_cpu_online+0x65/0xb0
   ? rcu_is_watching+0x23/0x50
   ? bpf_map_lookup_elem+0x54/0x60
   ? __pfx_bpf_map_lookup_elem+0x10/0x10
   ___bpf_prog_run+0x513/0x3b70
   __bpf_prog_run32+0x9d/0xd0
   ? __bpf_prog_enter_sleepable_recur+0xad/0x120
   ? __bpf_prog_enter_sleepable_recur+0x3e/0x120
   bpf_trampoline_6442580665+0x4d/0x1000
   __x64_sys_getpgid+0x5/0x30
   ? do_syscall_64+0x36/0xb0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52628</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: exthdr: fix 4-byte stack OOB write

If priv-&gt;len is a multiple of 4, then dst[len / 4] can write past
the destination array which leads to stack corruption.

This construct is necessary to clean the remainder of the register
in case -&gt;len is NOT a multiple of the register size, so make it
conditional just like nft_payload.c does.

The bug was added in 4.1 cycle and then copied/inherited when
tcp/sctp and ip option support was added.

Bug reported by Zero Day Initiative project (ZDI-CAN-21950,
ZDI-CAN-21951, ZDI-CAN-21961).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222118">SUSE bug 1222118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52654</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52654" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/af_unix: disable sending io_uring over sockets

File reference cycles have caused lots of problems for io_uring
in the past, and it still doesn't work exactly right and races with
unix_stream_read_generic(). The safest fix would be to completely
disallow sending io_uring files via sockets via SCM_RIGHT, so there
are no possible cycles invloving registered files and thus rendering
SCM accounting on the io_uring side unnecessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: aqc111: check packet for fixup for true limit

If a device sends a packet that is inbetween 0
and sizeof(u64) the value passed to skb_trim()
as length will wrap around ending up as some very
large value.

The driver will then proceed to parse the header
located at that position, which will either oops or
process some random value.

The fix is to check against sizeof(u64) rather than
0, which the driver currently does. The issue exists
since the introduction of the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52676</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52676" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Guard stack limits against 32bit overflow

This patch promotes the arithmetic around checking stack bounds to be
done in the 64-bit domain, instead of the current 32bit. The arithmetic
implies adding together a 64-bit register with a int offset. The
register was checked to be below 1&lt;&lt;29 when it was variable, but not
when it was fixed. The offset either comes from an instruction (in which
case it is 16 bit), from another register (in which case the caller
checked it to be below 1&lt;&lt;29 [1]), or from the size of an argument to a
kfunc (in which case it can be a u32 [2]). Between the register being
inconsistently checked to be below 1&lt;&lt;29, and the offset being up to an
u32, it appears that we were open to overflowing the `int`s which were
currently used for arithmetic.

[1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498
[2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226336">SUSE bug 1226336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52686</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check in opal_event_init()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52690</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52690" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check to scom_debug_init_one()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
Add a null pointer check, and release 'ent' to avoid memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52702</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52702" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()

old_meter needs to be free after it is detached regardless of whether
the new meter is successfully attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52703</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path

syzbot reported that act_len in kalmia_send_init_packet() is
uninitialized when passing it to the first usb_bulk_msg error path. Jiri
Pirko noted that it's pointless to pass it in the error path, and that
the value that would be printed in the second error path would be the
value of act_len from the first call to usb_bulk_msg.[1]

With this in mind, let's just not pass act_len to the usb_bulk_msg error
paths.

1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52707</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/psi: Fix use-after-free in ep_remove_wait_queue()

If a non-root cgroup gets removed when there is a thread that registered
trigger and is polling on a pressure file within the cgroup, the polling
waitqueue gets freed in the following path:

 do_rmdir
   cgroup_rmdir
     kernfs_drain_open_files
       cgroup_file_release
         cgroup_pressure_release
           psi_trigger_destroy

However, the polling thread still has a reference to the pressure file and
will access the freed waitqueue when the file is closed or upon exit:

 fput
   ep_eventpoll_release
     ep_free
       ep_remove_wait_queue
         remove_wait_queue

This results in use-after-free as pasted below.

The fundamental problem here is that cgroup_file_release() (and
consequently waitqueue's lifetime) is not tied to the file's real lifetime.
Using wake_up_pollfree() here might be less than ideal, but it is in line
with the comment at commit 42288cb44c4b ("wait: add wake_up_pollfree()")
since the waitqueue's lifetime is not tied to file's one and can be
considered as another special case. While this would be fixable by somehow
making cgroup_file_release() be tied to the fput(), it would require
sizable refactoring at cgroups or higher layer which might be more
justifiable if we identify more cases like this.

  BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0
  Write of size 4 at addr ffff88810e625328 by task a.out/4404

	CPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38
	Hardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017
	Call Trace:
	&lt;TASK&gt;
	dump_stack_lvl+0x73/0xa0
	print_report+0x16c/0x4e0
	kasan_report+0xc3/0xf0
	kasan_check_range+0x2d2/0x310
	_raw_spin_lock_irqsave+0x60/0xc0
	remove_wait_queue+0x1a/0xa0
	ep_free+0x12c/0x170
	ep_eventpoll_release+0x26/0x30
	__fput+0x202/0x400
	task_work_run+0x11d/0x170
	do_exit+0x495/0x1130
	do_group_exit+0x100/0x100
	get_signal+0xd67/0xde0
	arch_do_signal_or_restart+0x2a/0x2b0
	exit_to_user_mode_prepare+0x94/0x100
	syscall_exit_to_user_mode+0x20/0x40
	do_syscall_64+0x52/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
	&lt;/TASK&gt;

 Allocated by task 4404:

	kasan_set_track+0x3d/0x60
	__kasan_kmalloc+0x85/0x90
	psi_trigger_create+0x113/0x3e0
	pressure_write+0x146/0x2e0
	cgroup_file_write+0x11c/0x250
	kernfs_fop_write_iter+0x186/0x220
	vfs_write+0x3d8/0x5c0
	ksys_write+0x90/0x110
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd

 Freed by task 4407:

	kasan_set_track+0x3d/0x60
	kasan_save_free_info+0x27/0x40
	____kasan_slab_free+0x11d/0x170
	slab_free_freelist_hook+0x87/0x150
	__kmem_cache_free+0xcb/0x180
	psi_trigger_destroy+0x2e8/0x310
	cgroup_file_release+0x4f/0xb0
	kernfs_drain_open_files+0x165/0x1f0
	kernfs_drain+0x162/0x1a0
	__kernfs_remove+0x1fb/0x310
	kernfs_remove_by_name_ns+0x95/0xe0
	cgroup_addrm_files+0x67f/0x700
	cgroup_destroy_locked+0x283/0x3c0
	cgroup_rmdir+0x29/0x100
	kernfs_iop_rmdir+0xd1/0x140
	vfs_rmdir+0xfe/0x240
	do_rmdir+0x13d/0x280
	__x64_sys_rmdir+0x2c/0x30
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52708</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52708" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmc_spi: fix error handling in mmc_spi_probe()

If mmc_add_host() fails, it doesn't need to call mmc_remove_host(),
or it will cause null-ptr-deref, because of deleting a not added
device in mmc_remove_host().

To fix this, goto label 'fail_glue_init', if mmc_add_host() fails,
and change the label 'fail_add_host' to 'fail_gpiod_request'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52730</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdio: fix possible resource leaks in some error paths

If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can
not release the resources, because the sdio function is not presented
in these two cases, it won't call of_node_put() or put_device().

To fix these leaks, make sdio_func_present() only control whether
device_del() needs to be called or not, then always call of_node_put()
and put_device().

In error case in sdio_init_func(), the reference of 'card-&gt;dev' is
not get, to avoid redundant put in sdio_free_func_cis(), move the
get_device() to sdio_alloc_func() and put_device() to sdio_release_func(),
it can keep the get/put function be balanced.

Without this patch, while doing fault inject test, it can get the
following leak reports, after this fix, the leak is gone.

unreferenced object 0xffff888112514000 (size 2048):
  comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s)
  hex dump (first 32 bytes):
    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......
    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....
  backtrace:
    [&lt;000000009e5931da&gt;] kmalloc_trace+0x21/0x110
    [&lt;000000002f839ccb&gt;] mmc_alloc_card+0x38/0xb0 [mmc_core]
    [&lt;0000000004adcbf6&gt;] mmc_sdio_init_card+0xde/0x170 [mmc_core]
    [&lt;000000007538fea0&gt;] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]
    [&lt;00000000d4fdeba7&gt;] mmc_rescan+0x54a/0x640 [mmc_core]

unreferenced object 0xffff888112511000 (size 2048):
  comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s)
  hex dump (first 32 bytes):
    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......
    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....
  backtrace:
    [&lt;000000009e5931da&gt;] kmalloc_trace+0x21/0x110
    [&lt;00000000fcbe706c&gt;] sdio_alloc_func+0x35/0x100 [mmc_core]
    [&lt;00000000c68f4b50&gt;] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]
    [&lt;00000000d4fdeba7&gt;] mmc_rescan+0x54a/0x640 [mmc_core]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/decompressor: specify __decompress() buf len to avoid overflow

Historically calls to __decompress() didn't specify "out_len" parameter
on many architectures including s390, expecting that no writes beyond
uncompressed kernel image are performed. This has changed since commit
2aa14b1ab2c4 ("zstd: import usptream v1.5.2") which includes zstd library
commit 6a7ede3dfccb ("Reduce size of dctx by reutilizing dst buffer
(#2751)"). Now zstd decompression code might store literal buffer in
the unwritten portion of the destination buffer. Since "out_len" is
not set, it is considered to be unlimited and hence free to use for
optimization needs. On s390 this might corrupt initrd or ipl report
which are often placed right after the decompressor buffer. Luckily the
size of uncompressed kernel image is already known to the decompressor,
so to avoid the problem simply specify it in the "out_len" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52736</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52736" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Do not unset preset when cleaning up codec

Several functions that take part in codec's initialization and removal
are re-used by ASoC codec drivers implementations. Drivers mimic the
behavior of hda_codec_driver_probe/remove() found in
sound/pci/hda/hda_bind.c with their component-&gt;probe/remove() instead.

One of the reasons for that is the expectation of
snd_hda_codec_device_new() to receive a valid pointer to an instance of
struct snd_card. This expectation can be met only once sound card
components probing commences.

As ASoC sound card may be unbound without codec device being actually
removed from the system, unsetting -&gt;preset in
snd_hda_codec_cleanup_for_unbind() interferes with module unload -&gt; load
scenario causing null-ptr-deref. Preset is assigned only once, during
device/driver matching whereas ASoC codec driver's module reloading may
occur several times throughout the lifetime of an audio stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52738" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini

Currently amdgpu calls drm_sched_fini() from the fence driver sw fini
routine - such function is expected to be called only after the
respective init function - drm_sched_init() - was executed successfully.

Happens that we faced a driver probe failure in the Steam Deck
recently, and the function drm_sched_fini() was called even without
its counter-part had been previously called, causing the following oops:

amdgpu: probe of 0000:04:00.0 failed with error -110
BUG: kernel NULL pointer dereference, address: 0000000000000090
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 609 Comm: systemd-udevd Not tainted 6.2.0-rc3-gpiccoli #338
Hardware name: Valve Jupiter/Jupiter, BIOS F7A0113 11/04/2022
RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched]
[...]
Call Trace:
 &lt;TASK&gt;
 amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu]
 amdgpu_device_fini_sw+0x2b/0x3b0 [amdgpu]
 amdgpu_driver_release_kms+0x16/0x30 [amdgpu]
 devm_drm_dev_init_release+0x49/0x70
 [...]

To prevent that, check if the drm_sched was properly initialized for a
given ring before calling its fini counter-part.

Notice ideally we'd use sched.ready for that; such field is set as the latest
thing on drm_sched_init(). But amdgpu seems to "override" the meaning of such
field - in the above oops for example, it was a GFX ring causing the crash, and
the sched.ready field was set to true in the ring init routine, regardless of
the state of the DRM scheduler. Hence, we ended-up using sched.ops as per
Christian's suggestion [0], and also removed the no_scheduler check [1].

[0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/
[1] https://lore.kernel.org/amd-gfx/cd0e2994-f85f-d837-609f-7056d5fb7231@amd.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52739" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Fix page corruption caused by racy check in __free_pages

When we upgraded our kernel, we started seeing some page corruption like
the following consistently:

  BUG: Bad page state in process ganesha.nfsd  pfn:1304ca
  page:0000000022261c55 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1304ca
  flags: 0x17ffffc0000000()
  raw: 0017ffffc0000000 ffff8a513ffd4c98 ffffeee24b35ec08 0000000000000000
  raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000
  page dumped because: nonzero mapcount
  CPU: 0 PID: 15567 Comm: ganesha.nfsd Kdump: loaded Tainted: P    B      O      5.10.158-1.nutanix.20221209.el7.x86_64 #1
  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
  Call Trace:
   dump_stack+0x74/0x96
   bad_page.cold+0x63/0x94
   check_new_page_bad+0x6d/0x80
   rmqueue+0x46e/0x970
   get_page_from_freelist+0xcb/0x3f0
   ? _cond_resched+0x19/0x40
   __alloc_pages_nodemask+0x164/0x300
   alloc_pages_current+0x87/0xf0
   skb_page_frag_refill+0x84/0x110
   ...

Sometimes, it would also show up as corruption in the free list pointer
and cause crashes.

After bisecting the issue, we found the issue started from commit
e320d3012d25 ("mm/page_alloc.c: fix freeing non-compound pages"):

	if (put_page_testzero(page))
		free_the_page(page, order);
	else if (!PageHead(page))
		while (order-- &gt; 0)
			free_the_page(page + (1 &lt;&lt; order), order);

So the problem is the check PageHead is racy because at this point we
already dropped our reference to the page.  So even if we came in with
compound page, the page can already be freed and PageHead can return
false and we will end up freeing all the tail pages causing double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225119">SUSE bug 1225119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52740</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52740" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch

The RFI and STF security mitigation options can flip the
interrupt_exit_not_reentrant static branch condition concurrently with
the interrupt exit code which tests that branch.

Interrupt exit tests this condition to set MSR[EE|RI] for exit, then
again in the case a soft-masked interrupt is found pending, to recover
the MSR so the interrupt can be replayed before attempting to exit
again. If the condition changes between these two tests, the MSR and irq
soft-mask state will become corrupted, leading to warnings and possible
crashes. For example, if the branch is initially true then false,
MSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear and EE may not get
enabled, leading to warnings in irq_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52741" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix use-after-free in rdata-&gt;read_into_pages()

When the network status is unstable, use-after-free may occur when
read data from the server.

  BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0

  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x38/0x4c
   print_report+0x16f/0x4a6
   kasan_report+0xb7/0x130
   readpages_fill_pages+0x14c/0x7e0
   cifs_readv_receive+0x46d/0xa40
   cifs_demultiplex_thread+0x121c/0x1490
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50
   &lt;/TASK&gt;

  Allocated by task 2535:
   kasan_save_stack+0x22/0x50
   kasan_set_track+0x25/0x30
   __kasan_kmalloc+0x82/0x90
   cifs_readdata_direct_alloc+0x2c/0x110
   cifs_readdata_alloc+0x2d/0x60
   cifs_readahead+0x393/0xfe0
   read_pages+0x12f/0x470
   page_cache_ra_unbounded+0x1b1/0x240
   filemap_get_pages+0x1c8/0x9a0
   filemap_read+0x1c0/0x540
   cifs_strict_readv+0x21b/0x240
   vfs_read+0x395/0x4b0
   ksys_read+0xb8/0x150
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

  Freed by task 79:
   kasan_save_stack+0x22/0x50
   kasan_set_track+0x25/0x30
   kasan_save_free_info+0x2e/0x50
   __kasan_slab_free+0x10e/0x1a0
   __kmem_cache_free+0x7a/0x1a0
   cifs_readdata_release+0x49/0x60
   process_one_work+0x46c/0x760
   worker_thread+0x2a4/0x6f0
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50

  Last potentially related work creation:
   kasan_save_stack+0x22/0x50
   __kasan_record_aux_stack+0x95/0xb0
   insert_work+0x2b/0x130
   __queue_work+0x1fe/0x660
   queue_work_on+0x4b/0x60
   smb2_readv_callback+0x396/0x800
   cifs_abort_connection+0x474/0x6a0
   cifs_reconnect+0x5cb/0xa50
   cifs_readv_from_socket.cold+0x22/0x6c
   cifs_read_page_from_socket+0xc1/0x100
   readpages_fill_pages.cold+0x2f/0x46
   cifs_readv_receive+0x46d/0xa40
   cifs_demultiplex_thread+0x121c/0x1490
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50

The following function calls will cause UAF of the rdata pointer.

readpages_fill_pages
 cifs_read_page_from_socket
  cifs_readv_from_socket
   cifs_reconnect
    __cifs_reconnect
     cifs_abort_connection
      mid-&gt;callback() --&gt; smb2_readv_callback
       queue_work(&amp;rdata-&gt;work)  # if the worker completes first,
                                 # the rdata is freed
          cifs_readv_complete
            kref_put
              cifs_readdata_release
                kfree(rdata)
 return rdata-&gt;...               # UAF in readpages_fill_pages()

Similarly, this problem also occurs in the uncache_fill_pages().

Fix this by adjusts the order of condition judgment in the return
statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52742" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: USB: Fix wrong-direction WARNING in plusb.c

The syzbot fuzzer detected a bug in the plusb network driver: A
zero-length control-OUT transfer was treated as a read instead of a
write.  In modern kernels this error provokes a WARNING:

usb 1-1: BOGUS control dir, pipe 80000280 doesn't match bRequestType c0
WARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411
usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
Modules linked in:
CPU: 1 PID: 4645 Comm: dhcpcd Not tainted
6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
01/12/2023
RIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
...
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58
 usb_internal_control_msg drivers/usb/core/message.c:102 [inline]
 usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153
 __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010
 usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068
 pl_vendor_req drivers/net/usb/plusb.c:60 [inline]
 pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]
 pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85
 usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889
 __dev_open+0x297/0x4d0 net/core/dev.c:1417
 __dev_change_flags+0x587/0x750 net/core/dev.c:8530
 dev_change_flags+0x97/0x170 net/core/dev.c:8602
 devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147
 inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979
 sock_do_ioctl+0xcc/0x230 net/socket.c:1169
 sock_ioctl+0x1f8/0x680 net/socket.c:1286
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and
remove the USB_DIR_IN flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Do not use WQ_MEM_RECLAIM flag for workqueue

When both ice and the irdma driver are loaded, a warning in
check_flush_dependency is being triggered. This is due to ice driver
workqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one
is not.

According to kernel documentation, this flag should be set if the
workqueue will be involved in the kernel's memory reclamation flow.
Since it is not, there is no need for the ice driver's WQ to have this
flag set so remove it.

Example trace:

[  +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0
[  +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha
in_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel
_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1
0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_
core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs
ib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter
acpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba
ta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
[  +0.000161]  [last unloaded: bonding]
[  +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S                 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1
[  +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  +0.000003] Workqueue: ice ice_service_task [ice]
[  +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0
[  +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08
9f e8 bb d3 07 01 &lt;0f&gt; 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06
[  +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282
[  +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000
[  +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80
[  +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112
[  +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000
[  +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400
[  +0.000004] FS:  0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000
[  +0.000003] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0
[  +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  +0.000002] PKRU: 55555554
[  +0.000003] Call Trace:
[  +0.000002]  &lt;TASK&gt;
[  +0.000003]  __flush_workqueue+0x203/0x840
[  +0.000006]  ? mutex_unlock+0x84/0xd0
[  +0.000008]  ? __pfx_mutex_unlock+0x10/0x10
[  +0.000004]  ? __pfx___flush_workqueue+0x10/0x10
[  +0.000006]  ? mutex_lock+0xa3/0xf0
[  +0.000005]  ib_cache_cleanup_one+0x39/0x190 [ib_core]
[  +0.000174]  __ib_unregister_device+0x84/0xf0 [ib_core]
[  +0.000094]  ib_unregister_device+0x25/0x30 [ib_core]
[  +0.000093]  irdma_ib_unregister_device+0x97/0xc0 [irdma]
[  +0.000064]  ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]
[  +0.000059]  ? up_write+0x5c/0x90
[  +0.000005]  irdma_remove+0x36/0x90 [irdma]
[  +0.000062]  auxiliary_bus_remove+0x32/0x50
[  +0.000007]  device_r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52744" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix potential NULL-ptr-dereference

in_dev_get() can return NULL which will cause a failure once idev is
dereferenced in in_dev_for_each_ifa_rtnl(). This patch adds a
check for NULL value in idev beforehand.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/IPoIB: Fix legacy IPoIB due to wrong number of queues

The cited commit creates child PKEY interfaces over netlink will
multiple tx and rx queues, but some devices doesn't support more than 1
tx and 1 rx queues. This causes to a crash when traffic is sent over the
PKEY interface due to the parent having a single queue but the child
having multiple queues.

This patch fixes the number of queues to 1 for legacy IPoIB at the
earliest possible point in time.

BUG: kernel NULL pointer dereference, address: 000000000000036b
PGD 0 P4D 0
Oops: 0000 [#1] SMP
CPU: 4 PID: 209665 Comm: python3 Not tainted 6.1.0_for_upstream_min_debug_2022_12_12_17_02 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:kmem_cache_alloc+0xcb/0x450
Code: ce 7e 49 8b 50 08 49 83 78 10 00 4d 8b 28 0f 84 cb 02 00 00 4d 85 ed 0f 84 c2 02 00 00 41 8b 44 24 28 48 8d 4a
01 49 8b 3c 24 &lt;49&gt; 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 74 b8 41 8b
RSP: 0018:ffff88822acbbab8 EFLAGS: 00010202
RAX: 0000000000000070 RBX: ffff8881c28e3e00 RCX: 00000000064f8dae
RDX: 00000000064f8dad RSI: 0000000000000a20 RDI: 0000000000030d00
RBP: 0000000000000a20 R08: ffff8882f5d30d00 R09: ffff888104032f40
R10: ffff88810fade828 R11: 736f6d6570736575 R12: ffff88810081c000
R13: 00000000000002fb R14: ffffffff817fc865 R15: 0000000000000000
FS:  00007f9324ff9700(0000) GS:ffff8882f5d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000036b CR3: 00000001125af004 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 skb_clone+0x55/0xd0
 ip6_finish_output2+0x3fe/0x690
 ip6_finish_output+0xfa/0x310
 ip6_send_skb+0x1e/0x60
 udp_v6_send_skb+0x1e5/0x420
 udpv6_sendmsg+0xb3c/0xe60
 ? ip_mc_finish_output+0x180/0x180
 ? __switch_to_asm+0x3a/0x60
 ? __switch_to_asm+0x34/0x60
 sock_sendmsg+0x33/0x40
 __sys_sendto+0x103/0x160
 ? _copy_to_user+0x21/0x30
 ? kvm_clock_get_cycles+0xd/0x10
 ? ktime_get_ts64+0x49/0xe0
 __x64_sys_sendto+0x25/0x30
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f9374f1ed14
Code: 42 41 f8 ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b
7c 24 08 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 68 41 f8 ff 48 8b
RSP: 002b:00007f9324ff7bd0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f9324ff7cc8 RCX: 00007f9374f1ed14
RDX: 00000000000002fb RSI: 00007f93000052f0 RDI: 0000000000000030
RBP: 0000000000000000 R08: 00007f9324ff7d40 R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 000000012a05f200 R14: 0000000000000001 R15: 00007f9374d57bdc
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52747" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Restore allocated resources on failed copyout

Fix a resource leak if an error occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid NULL dereference of timing generator

[Why &amp; How]
Check whether assigned timing generator is NULL or not before
accessing its funcs to prevent NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52754" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imon: fix access to invalid resource for the second interface

imon driver probes two USB interfaces, and at the probe of the second
interface, the driver assumes blindly that the first interface got
bound with the same imon driver.  It's usually true, but it's still
possible that the first interface is bound with another driver via a
malformed descriptor.  Then it may lead to a memory corruption, as
spotted by syzkaller; imon driver accesses the data from drvdata as
struct imon_context object although it's a completely different one
that was assigned by another driver.

This patch adds a sanity check -- whether the first interface is
really bound with the imon driver or not -- for avoiding the problem
above at the probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52756</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52759</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52759" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52763</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52763" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.

The `i3c_master_bus_init` function may attach the I2C devices before the
I3C bus initialization. In this flow, the DAT `alloc_entry`` will be used
before the DAT `init`. Additionally, if the `i3c_master_bus_init` fails,
the DAT `cleanup` will execute before the device is detached, which will
execue DAT `free_entry` function. The above scenario can cause the driver
to use DAT_data when it is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52764</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52764" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: gspca: cpia1: shift-out-of-bounds in set_flicker

Syzkaller reported the following issue:
UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27
shift exponent 245 is too large for 32-bit type 'int'

When the value of the variable "sd-&gt;params.exposure.gain" exceeds the
number of bits in an integer, a shift-out-of-bounds error is reported. It
is triggered because the variable "currentexp" cannot be left-shifted by
more than the number of bits in an integer. In order to avoid invalid
range during left-shift, the conditional expression is added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler

Do not loop over ring headers in hci_dma_irq_handler() that are not
allocated and enabled in hci_dma_init(). Otherwise out of bounds access
will occur from rings-&gt;headers[i] access when i &gt;= number of allocated
ring headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52774</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52774" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: protect device queue against concurrent access

In dasd_profile_start() the amount of requests on the device queue are
counted. The access to the device queue is unprotected against
concurrent access. With a lot of parallel I/O, especially with alias
devices enabled, the device queue can change while dasd_profile_start()
is accessing the queue. In the worst case this leads to a kernel panic
due to incorrect pointer accesses.

Fix this by taking the device lock before accessing the queue and
counting the requests. Additionally the check for a valid profile data
pointer can be done earlier to avoid unnecessary locking in a hot path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52781</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: config: fix iteration issue in 'usb_get_bos_descriptor()'

The BOS descriptor defines a root descriptor and is the base descriptor for
accessing a family of related descriptors.

Function 'usb_get_bos_descriptor()' encounters an iteration issue when
skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in
the same descriptor being read repeatedly.

To address this issue, a 'goto' statement is introduced to ensure that the
pointer and the amount read is updated correctly. This ensures that the
function iterates to the next descriptor instead of reading the same
descriptor repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i915/perf: Fix NULL deref bugs with drm_dbg() calls

When i915 perf interface is not available dereferencing it will lead to
NULL dereferences.

As returning -ENOTSUPP is pretty clear return when perf interface is not
available.

[tursulin: added stable tag]
(cherry picked from commit 36f27350ff745bd228ab04d7845dfbffc177a889)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52789</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52789" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: vcc: Add check for kstrdup() in vcc_probe()

Add check for the return value of kstrdup() and return the error, if it
fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52791</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52791" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: core: Run atomic i2c xfer when !preemptible

Since bae1d3a05a8b, i2c transfers are non-atomic if preemption is
disabled. However, non-atomic i2c transfers require preemption (e.g. in
wait_for_completion() while waiting for the DMA).

panic() calls preempt_disable_notrace() before calling
emergency_restart(). Therefore, if an i2c device is used for the
restart, the xfer should be atomic. This avoids warnings like:

[   12.667612] WARNING: CPU: 1 PID: 1 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x33c/0x6b0
[   12.676926] Voluntary context switch within RCU read-side critical section!
...
[   12.742376]  schedule_timeout from wait_for_completion_timeout+0x90/0x114
[   12.749179]  wait_for_completion_timeout from tegra_i2c_wait_completion+0x40/0x70
...
[   12.994527]  atomic_notifier_call_chain from machine_restart+0x34/0x58
[   13.001050]  machine_restart from panic+0x2a8/0x32c

Use !preemptible() instead, which is basically the same check as
pre-v5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52798" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix dfs radar event locking

The ath11k active pdevs are protected by RCU but the DFS radar event
handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52799</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in dbFindLeaf

Currently while searching for dmtree_t for sufficient free blocks there
is an array out of bounds while getting element in tp-&gt;dm_stree. To add
the required check for out of bound we first need to determine the type
of dmtree. Thus added an extra parameter to dbFindLeaf so that the type
of tree can be determined and the required check can be applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52800</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix htt pktlog locking

The ath11k active pdevs are protected by RCU but the htt pktlog handling
code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Add validity check for db_maxag and db_agpref

Both db_maxag and db_agpref are used as the index of the
db_agfree array, but there is currently no validity check for
db_maxag and db_agpref, which can lead to errors.

The following is related bug reported by Syzbot:

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20
index 7936 is out of range for type 'atomic_t[128]'

Add checking that the values of db_maxag and db_agpref are valid
indexes for the db_agfree array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52805</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52805" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in diAlloc

Currently there is not check against the agno of the iag while
allocating new inodes to avoid fragmentation problem. Added the check
which is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52806</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52806" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix possible null-ptr-deref when assigning a stream

While AudioDSP drivers assign streams exclusively of HOST or LINK type,
nothing blocks a user to attempt to assign a COUPLED stream. As
supplied substream instance may be a stub, what is the case when
code-loading, such scenario ends with null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52810</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52810" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Add check for negative db_l2nbperpage

l2nbperpage is log2(number of blks per page), and the minimum legal
value should be 0, not negative.

In the case of l2nbperpage being negative, an error will occur
when subsequently used as shift exponent.

Syzbot reported this bug:

UBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12
shift exponent -16777216 is negative
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52811</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52811" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool

In practice the driver should never send more commands than are allocated
to a queue's event pool. In the unlikely event that this happens, the code
asserts a BUG_ON, and in the case that the kernel is not configured to
crash on panic returns a junk event pointer from the empty event list
causing things to spiral from there. This BUG_ON is a historical artifact
of the ibmvfc driver first being upstreamed, and it is well known now that
the use of BUG_ON is bad practice except in the most unrecoverable
scenario. There is nothing about this scenario that prevents the driver
from recovering and carrying on.

Remove the BUG_ON in question from ibmvfc_get_event() and return a NULL
pointer in the case of an empty event pool. Update all call sites to
ibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate
failure or recovery action.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52814" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential null pointer derefernce

The amdgpu_ras_get_context may return NULL if device
not support ras feature, so add check before using.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52816" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix shift out-of-bounds issue

[  567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int'
[  567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G           OE      6.2.0-34-generic #34~22.04.1-Ubuntu
[  567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N_871 09/25/2023
[  567.614504] Workqueue: events send_exception_work_handler [amdgpu]
[  567.614748] Call Trace:
[  567.614750]  &lt;TASK&gt;
[  567.614753]  dump_stack_lvl+0x48/0x70
[  567.614761]  dump_stack+0x10/0x20
[  567.614763]  __ubsan_handle_shift_out_of_bounds+0x156/0x310
[  567.614769]  ? srso_alias_return_thunk+0x5/0x7f
[  567.614773]  ? update_sd_lb_stats.constprop.0+0xf2/0x3c0
[  567.614780]  svm_range_split_by_granularity.cold+0x2b/0x34 [amdgpu]
[  567.615047]  ? srso_alias_return_thunk+0x5/0x7f
[  567.615052]  svm_migrate_to_ram+0x185/0x4d0 [amdgpu]
[  567.615286]  do_swap_page+0x7b6/0xa30
[  567.615291]  ? srso_alias_return_thunk+0x5/0x7f
[  567.615294]  ? __free_pages+0x119/0x130
[  567.615299]  handle_pte_fault+0x227/0x280
[  567.615303]  __handle_mm_fault+0x3c0/0x720
[  567.615311]  handle_mm_fault+0x119/0x330
[  567.615314]  ? lock_mm_and_find_vma+0x44/0x250
[  567.615318]  do_user_addr_fault+0x1a9/0x640
[  567.615323]  exc_page_fault+0x81/0x1b0
[  567.615328]  asm_exc_page_fault+0x27/0x30
[  567.615332] RIP: 0010:__get_user_8+0x1c/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL

In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:

1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G           OE     5.15.0-43-generic #46-Ubunt       u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS:  00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]  &lt;TASK&gt;
[4005007.702640]  amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]
[4005007.703002]  full_proxy_read+0x5c/0x80
[4005007.703011]  vfs_read+0x9f/0x1a0
[4005007.703019]  ksys_read+0x67/0xe0
[4005007.703023]  __x64_sys_read+0x19/0x20
[4005007.703028]  do_syscall_64+0x5c/0xc0
[4005007.703034]  ? do_user_addr_fault+0x1e3/0x670
[4005007.703040]  ? exit_to_user_mode_prepare+0x37/0xb0
[4005007.703047]  ? irqentry_exit_to_user_mode+0x9/0x20
[4005007.703052]  ? irqentry_exit+0x19/0x30
[4005007.703057]  ? exc_page_fault+0x89/0x160
[4005007.703062]  ? asm_exc_page_fault+0x8/0x30
[4005007.703068]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[4005007.703075] RIP: 0033:0x7f5e07672992
[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f        1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e       c 28 48 89 54 24
[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992
[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003
[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010
[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000
[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
[4005007.703105]  &lt;/TASK&gt;
[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_       iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t       tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm       i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo       mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v       2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core        drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca
[4005007.703184] CR2: 0000000000000000
[4005007.703188] ---[ en
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52818</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52818" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7

For pptable structs that use flexible array sizes, use flexible arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52819" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga

For pptable structs that use flexible array sizes, use flexible arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel: fix a possible null pointer dereference

In versatile_panel_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52825</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52825" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix a race condition of vram buffer unref in svm code

prange-&gt;svm_bo unref can happen in both mmu callback and a callback after
migrate to system ram. Both are async call in different tasks. Sync svm_bo
unref operation to avoid random "use-after-free".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52826</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52826" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference

In tpg110_get_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52832</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52832" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't return unset power in ieee80211_get_tx_power()

We can get a UBSAN warning if ieee80211_get_tx_power() returns the
INT_MIN value mac80211 internally uses for "unset power level".

 UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5
 -2147483648 * 100 cannot be represented in type 'int'
 CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE
 Call Trace:
  dump_stack+0x74/0x92
  ubsan_epilogue+0x9/0x50
  handle_overflow+0x8d/0xd0
  __ubsan_handle_mul_overflow+0xe/0x10
  nl80211_send_iface+0x688/0x6b0 [cfg80211]
  [...]
  cfg80211_register_wdev+0x78/0xb0 [cfg80211]
  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]
  [...]
  ieee80211_if_add+0x60e/0x8f0 [mac80211]
  ieee80211_register_hw+0xda5/0x1170 [mac80211]

In this case, simply return an error instead, to indicate
that no data is available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52833</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52833" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: Add date-&gt;evt_skb is NULL check

fix crash because of null pointers

[ 6104.969662] BUG: kernel NULL pointer dereference, address: 00000000000000c8
[ 6104.969667] #PF: supervisor read access in kernel mode
[ 6104.969668] #PF: error_code(0x0000) - not-present page
[ 6104.969670] PGD 0 P4D 0
[ 6104.969673] Oops: 0000 [#1] SMP NOPTI
[ 6104.969684] RIP: 0010:btusb_mtk_hci_wmt_sync+0x144/0x220 [btusb]
[ 6104.969688] RSP: 0018:ffffb8d681533d48 EFLAGS: 00010246
[ 6104.969689] RAX: 0000000000000000 RBX: ffff8ad560bb2000 RCX: 0000000000000006
[ 6104.969691] RDX: 0000000000000000 RSI: ffffb8d681533d08 RDI: 0000000000000000
[ 6104.969692] RBP: ffffb8d681533d70 R08: 0000000000000001 R09: 0000000000000001
[ 6104.969694] R10: 0000000000000001 R11: 00000000fa83b2da R12: ffff8ad461d1d7c0
[ 6104.969695] R13: 0000000000000000 R14: ffff8ad459618c18 R15: ffffb8d681533d90
[ 6104.969697] FS:  00007f5a1cab9d40(0000) GS:ffff8ad578200000(0000) knlGS:00000
[ 6104.969699] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 6104.969700] CR2: 00000000000000c8 CR3: 000000018620c001 CR4: 0000000000760ef0
[ 6104.969701] PKRU: 55555554
[ 6104.969702] Call Trace:
[ 6104.969708]  btusb_mtk_shutdown+0x44/0x80 [btusb]
[ 6104.969732]  hci_dev_do_close+0x470/0x5c0 [bluetooth]
[ 6104.969748]  hci_rfkill_set_block+0x56/0xa0 [bluetooth]
[ 6104.969753]  rfkill_set_block+0x92/0x160
[ 6104.969755]  rfkill_fop_write+0x136/0x1e0
[ 6104.969759]  __vfs_write+0x18/0x40
[ 6104.969761]  vfs_write+0xdf/0x1c0
[ 6104.969763]  ksys_write+0xb1/0xe0
[ 6104.969765]  __x64_sys_write+0x1a/0x20
[ 6104.969769]  do_syscall_64+0x51/0x180
[ 6104.969771]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 6104.969773] RIP: 0033:0x7f5a21f18fef
[ 6104.9] RSP: 002b:00007ffeefe39010 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[ 6104.969780] RAX: ffffffffffffffda RBX: 000055c10a7560a0 RCX: 00007f5a21f18fef
[ 6104.969781] RDX: 0000000000000008 RSI: 00007ffeefe39060 RDI: 0000000000000012
[ 6104.969782] RBP: 00007ffeefe39060 R08: 0000000000000000 R09: 0000000000000017
[ 6104.969784] R10: 00007ffeefe38d97 R11: 0000000000000293 R12: 0000000000000002
[ 6104.969785] R13: 00007ffeefe39220 R14: 00007ffeefe391a0 R15: 000055c10a72acf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52834" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atl1c: Work around the DMA RX overflow issue

This is based on alx driver commit 881d0327db37 ("net: alx: Work around
the DMA RX overflow issue").

The alx and atl1c drivers had RX overflow error which was why a custom
allocator was created to avoid certain addresses. The simpler workaround
then created for alx driver, but not for atl1c due to lack of tester.

Instead of using a custom allocator, check the allocated skb address and
use skb_reserve() to move away from problematic 0x...fc0 address.

Tested on AR8131 on Acer 4540.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: imsttfb: fix a resource leak in probe

I've re-written the error handling but the bug is that if init_imstt()
fails we need to call iounmap(par-&gt;cmap_regs).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52840" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()

The put_device() calls rmi_release_function() which frees "fn" so the
dereference on the next line "fn-&gt;num_of_irqs" is a use after free.
Move the put_device() to the end to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: mux: Add check and kfree for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
Moreover, use kfree() in the later error handling in order to avoid
memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52844</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52844" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: psi: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52847</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: bttv: fix use after free error due to btv-&gt;timeout timer

There may be some a race condition between timer function
bttv_irq_timeout and bttv_remove. The timer is setup in
probe and there is no timer_delete operation in remove
function. When it hit kfree btv, the function might still be
invoked, which will cause use after free bug.

This bug is found by static analysis, it may be false positive.

Fix it by adding del_timer_sync invoking to the remove function.

cpu0                cpu1
                  bttv_probe
                    -&gt;timer_setup
                      -&gt;bttv_set_dma
                        -&gt;mod_timer;
bttv_remove
  -&gt;kfree(btv);
                  -&gt;bttv_irq_timeout
                    -&gt;USE btv
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hid: cp2112: Fix duplicate workqueue initialization

Previously the cp2112 driver called INIT_DELAYED_WORK within
cp2112_gpio_irq_startup, resulting in duplicate initilizations of the
workqueue on subsequent IRQ startups following an initial request. This
resulted in a warning in set_work_data in workqueue.c, as well as a rare
NULL dereference within process_one_work in workqueue.c.

Initialize the workqueue within _probe instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52854" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix refcnt handling in padata_free_shell()

In a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead
to system UAF (Use-After-Free) issues. Due to the lengthy analysis of
the pcrypt_aead01 function call, I'll describe the problem scenario
using a simplified model:

Suppose there's a user of padata named `user_function` that adheres to
the padata requirement of calling `padata_free_shell` after `serial()`
has been invoked, as demonstrated in the following code:

```c
struct request {
    struct padata_priv padata;
    struct completion *done;
};

void parallel(struct padata_priv *padata) {
    do_something();
}

void serial(struct padata_priv *padata) {
    struct request *request = container_of(padata,
    				struct request,
				padata);
    complete(request-&gt;done);
}

void user_function() {
    DECLARE_COMPLETION(done)
    padata-&gt;parallel = parallel;
    padata-&gt;serial = serial;
    padata_do_parallel();
    wait_for_completion(&amp;done);
    padata_free_shell();
}
```

In the corresponding padata.c file, there's the following code:

```c
static void padata_serial_worker(struct work_struct *serial_work) {
    ...
    cnt = 0;

    while (!list_empty(&amp;local_list)) {
        ...
        padata-&gt;serial(padata);
        cnt++;
    }

    local_bh_enable();

    if (refcount_sub_and_test(cnt, &amp;pd-&gt;refcnt))
        padata_free_pd(pd);
}
```

Because of the high system load and the accumulation of unexecuted
softirq at this moment, `local_bh_enable()` in padata takes longer
to execute than usual. Subsequently, when accessing `pd-&gt;refcnt`,
`pd` has already been released by `padata_free_shell()`, resulting
in a UAF issue with `pd-&gt;refcnt`.

The fix is straightforward: add `refcount_dec_and_test` before calling
`padata_free_pd` in `padata_free_shell`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency

In _dwc2_hcd_urb_enqueue(), "urb-&gt;hcpriv = NULL" is executed without
holding the lock "hsotg-&gt;lock". In _dwc2_hcd_urb_dequeue():

    spin_lock_irqsave(&amp;hsotg-&gt;lock, flags);
    ...
	if (!urb-&gt;hcpriv) {
		dev_dbg(hsotg-&gt;dev, "## urb-&gt;hcpriv is NULL ##\n");
		goto out;
	}
    rc = dwc2_hcd_urb_dequeue(hsotg, urb-&gt;hcpriv); // Use urb-&gt;hcpriv
    ...
out:
    spin_unlock_irqrestore(&amp;hsotg-&gt;lock, flags);

When _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are
concurrently executed, the NULL check of "urb-&gt;hcpriv" can be executed
before "urb-&gt;hcpriv = NULL". After urb-&gt;hcpriv is NULL, it can be used
in the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL
pointer dereference.

This possible bug is found by an experimental static analysis tool
developed by myself. This tool analyzes the locking APIs to extract
function pairs that can be concurrently executed, and then analyzes the
instructions in the paired functions to identify possible concurrency
bugs including data races and atomicity violations. The above possible
bug is reported, when my tool analyzes the source code of Linux 6.5.

To fix this possible bug, "urb-&gt;hcpriv = NULL" should be executed with
holding the lock "hsotg-&gt;lock". After using this patch, my tool never
reports the possible bug, with the kernelconfiguration allyesconfig for
x86_64. Because I have no associated hardware, I cannot test the patch
in runtime testing, and just verify it according to the code logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52856</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52856" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: lt8912b: Fix crash on bridge detach

The lt8912b driver, in its bridge detach function, calls
drm_connector_unregister() and drm_connector_cleanup().

drm_connector_unregister() should be called only for connectors
explicitly registered with drm_connector_register(), which is not the
case in lt8912b.

The driver's drm_connector_funcs.destroy hook is set to
drm_connector_cleanup().

Thus the driver should not call either drm_connector_unregister() nor
drm_connector_cleanup() in its lt8912_bridge_detach(), as they cause a
crash on bridge detach:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=00000000858f3000
[0000000000000000] pgd=0800000085918003, p4d=0800000085918003, pud=0800000085431003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in: tidss(-) display_connector lontium_lt8912b tc358768 panel_lvds panel_simple drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks
CPU: 3 PID: 462 Comm: rmmod Tainted: G        W          6.5.0-rc2+ #2
Hardware name: Toradex Verdin AM62 on Verdin Development Board (DT)
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : drm_connector_cleanup+0x78/0x2d4 [drm]
lr : lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]
sp : ffff800082ed3a90
x29: ffff800082ed3a90 x28: ffff0000040c1940 x27: 0000000000000000
x26: 0000000000000000 x25: dead000000000122 x24: dead000000000122
x23: dead000000000100 x22: ffff000003fb6388 x21: 0000000000000000
x20: 0000000000000000 x19: ffff000003fb6260 x18: fffffffffffe56e8
x17: 0000000000000000 x16: 0010000000000000 x15: 0000000000000038
x14: 0000000000000000 x13: ffff800081914b48 x12: 000000000000040e
x11: 000000000000015a x10: ffff80008196ebb8 x9 : ffff800081914b48
x8 : 00000000ffffefff x7 : ffff0000040c1940 x6 : ffff80007aa649d0
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008159e008
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 drm_connector_cleanup+0x78/0x2d4 [drm]
 lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]
 drm_bridge_detach+0x44/0x84 [drm]
 drm_encoder_cleanup+0x40/0xb8 [drm]
 drmm_encoder_alloc_release+0x1c/0x30 [drm]
 drm_managed_release+0xac/0x148 [drm]
 drm_dev_put.part.0+0x88/0xb8 [drm]
 devm_drm_dev_init_release+0x14/0x24 [drm]
 devm_action_release+0x14/0x20
 release_nodes+0x5c/0x90
 devres_release_all+0x8c/0xe0
 device_unbind_cleanup+0x18/0x68
 device_release_driver_internal+0x208/0x23c
 driver_detach+0x4c/0x94
 bus_remove_driver+0x70/0xf4
 driver_unregister+0x30/0x60
 platform_driver_unregister+0x14/0x20
 tidss_platform_driver_exit+0x18/0xb2c [tidss]
 __arm64_sys_delete_module+0x1a0/0x2b4
 invoke_syscall+0x48/0x110
 el0_svc_common.constprop.0+0x60/0x10c
 do_el0_svc_compat+0x1c/0x40
 el0_svc_compat+0x40/0xac
 el0t_32_sync_handler+0xb0/0x138
 el0t_32_sync+0x194/0x198
Code: 9104a276 f2fbd5b7 aa0203e1 91008af8 (f85c0420)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52858</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52864</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: wmi: Fix opening of char device

Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via
file private data"), the miscdevice stores a pointer to itself inside
filp-&gt;private_data, which means that private_data will not be NULL when
wmi_char_open() is called. This might cause memory corruption should
wmi_char_open() be unable to find its driver, something which can
happen when the associated WMI device is deleted in wmi_free_devices().

Fix the problem by using the miscdevice pointer to retrieve the WMI
device data associated with a char device using container_of(). This
also avoids wmi_char_open() picking a wrong WMI device bound to a
driver with the same name as the original driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52865</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: possible buffer overflow

Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is
checked after access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: prevent potential string overflow

The dev-&gt;id value comes from ida_alloc() so it's a number between zero
and INT_MAX.  If it's too high then these sprintf()s will overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52870</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52870" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: llcc: Handle a second device without data corruption

Usually there is only one llcc device. But if there were a second, even
a failed probe call would modify the global drv_data pointer. So check
if drv_data is valid before overwriting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227475">SUSE bug 1227475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52872</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52872" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix race condition in status line change on dead connections

gsm_cleanup_mux() cleans up the gsm by closing all DLCIs, stopping all
timers, removing the virtual tty devices and clearing the data queues.
This procedure, however, may cause subsequent changes of the virtual modem
status lines of a DLCI. More data is being added the outgoing data queue
and the deleted kick timer is restarted to handle this. At this point many
resources have already been removed by the cleanup procedure. Thus, a
kernel panic occurs.

Fix this by proving in gsm_modem_update() that the cleanup procedure has
not been started and the mux is still alive.

Note that writing to a virtual tty is already protected by checks against
the DLCI specific connection state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52873</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52873" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52875</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52875" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52876</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52876" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52877</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()

It is possible that typec_register_partner() returns ERR_PTR on failure.
When port-&gt;partner is an error, a NULL pointer dereference may occur as
shown below.

[91222.095236][  T319] typec port0: failed to register partner (-17)
...
[91225.061491][  T319] Unable to handle kernel NULL pointer dereference
at virtual address 000000000000039f
[91225.274642][  T319] pc : tcpm_pd_data_request+0x310/0x13fc
[91225.274646][  T319] lr : tcpm_pd_data_request+0x298/0x13fc
[91225.308067][  T319] Call trace:
[91225.308070][  T319]  tcpm_pd_data_request+0x310/0x13fc
[91225.308073][  T319]  tcpm_pd_rx_handler+0x100/0x9e8
[91225.355900][  T319]  kthread_worker_fn+0x178/0x58c
[91225.355902][  T319]  kthread+0x150/0x200
[91225.355905][  T319]  ret_from_fork+0x10/0x30

Add a check for port-&gt;partner to avoid dereferencing a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52878</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds

If the "struct can_priv::echoo_skb" is accessed out of bounds, this
would cause a kernel crash. Instead, issue a meaningful warning
message and return with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52880</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc

Any unprivileged user can attach N_GSM0710 ldisc, but it requires
CAP_NET_ADMIN to create a GSM network anyway.

Require initial namespace CAP_NET_ADMIN to do that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5344</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5344" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5344" ref_url="https://www.suse.com/security/cve/CVE-2023-5344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5344/">CVE-2023-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215940">SUSE bug 1215940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812201" comment="vim-data-common-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812851" comment="vim-small-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5345</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.

In case of an error in smb3_fs_context_parse_param, ctx-&gt;password was freed but the field was not set to NULL which could lead to double free.

We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215899">SUSE bug 1215899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215971">SUSE bug 1215971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5363</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5363" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016834.html" source="SUSE-SU"/>
    <description>
    Issue summary: A bug has been identified in the processing of key and
initialisation vector (IV) lengths.  This can lead to potential truncation
or overruns during the initialisation of some symmetric ciphers.

Impact summary: A truncation in the IV can result in non-uniqueness,
which could result in loss of confidentiality for some cipher modes.

When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or
EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after
the key and IV have been established.  Any alterations to the key length,
via the "keylen" parameter or the IV length, via the "ivlen" parameter,
within the OSSL_PARAM array will not take effect as intended, potentially
causing truncation or overreading of these values.  The following ciphers
and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.

For the CCM, GCM and OCB cipher modes, truncation of the IV can result in
loss of confidentiality.  For example, when following NIST's SP 800-38D
section 8.2.1 guidance for constructing a deterministic IV for AES in
GCM mode, truncation of the counter portion could lead to IV reuse.

Both truncations and overruns of the key and overruns of the IV will
produce incorrect results and could, in some cases, trigger a memory
exception.  However, these issues are not currently assessed as security
critical.

Changing the key and/or IV lengths is not considered to be a common operation
and the vulnerable API was recently introduced. Furthermore it is likely that
application developers will have spotted this problem during testing since
decryption would fail unless both peers in the communication were similarly
vulnerable. For these reasons we expect the probability of an application being
vulnerable to this to be quite low. However if an application is vulnerable then
this issue is considered very serious. For these reasons we have assessed this
issue as Moderate severity overall.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because
the issue lies outside of the FIPS provider boundary.

OpenSSL 3.1 and 3.0 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216163">SUSE bug 1216163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803246" comment="libopenssl3-3.0.8-150400.4.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5388</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:2564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:2684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848748" comment="libfreebl3-3.90.2-150400.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848749" comment="libsoftokn3-3.90.2-150400.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848750" comment="mozilla-nss-3.90.2-150400.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848751" comment="mozilla-nss-certs-3.90.2-150400.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848752" comment="mozilla-nss-tools-3.90.2-150400.3.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5441</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5441" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5441" ref_url="https://www.suse.com/security/cve/CVE-2023-5441" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5441/">CVE-2023-5441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216001">SUSE bug 1216001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812201" comment="vim-data-common-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812851" comment="vim-small-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5535" ref_url="https://www.suse.com/security/cve/CVE-2023-5535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to v9.0.2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5535/">CVE-2023-5535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216167">SUSE bug 1216167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812201" comment="vim-data-common-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812851" comment="vim-small-9.0.2103-150000.5.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5678</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV/#L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017499.html" source="SUSE-SU"/>
    <description>
    Issue summary: Generating excessively long X9.42 DH keys or checking
excessively long X9.42 DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_generate_key() to
generate an X9.42 DH key may experience long delays.  Likewise, applications
that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.

While DH_check() performs all the necessary checks (as of CVE-2023-3817),
DH_check_pub_key() doesn't make any of these checks, and is therefore
vulnerable for excessively large P and Q parameters.

Likewise, while DH_generate_key() performs a check for an excessively large
P, it doesn't check for an excessively large Q.

An application that calls DH_generate_key() or DH_check_pub_key() and
supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

DH_generate_key() and DH_check_pub_key() are also called by a number of
other OpenSSL functions.  An application calling any of those other
functions may similarly be affected.  The other functions affected by this
are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().

Also vulnerable are the OpenSSL pkey command line application when using the
"-pubcheck" option, as well as the OpenSSL genpkey command line application.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217151">SUSE bug 1217151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219091">SUSE bug 1219091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219092">SUSE bug 1219092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219415">SUSE bug 1219415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219417">SUSE bug 1219417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219712">SUSE bug 1219712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220016">SUSE bug 1220016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810699" comment="libopenssl-1_1-devel-1.1.1l-150400.7.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810700" comment="libopenssl1_1-1.1.1l-150400.7.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810701" comment="libopenssl1_1-hmac-1.1.1l-150400.7.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813331" comment="libopenssl3-3.0.8-150400.4.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810702" comment="openssl-1_1-1.1.1l-150400.7.60.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5717</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.

If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.

We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-05-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216644">SUSE bug 1216644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217557">SUSE bug 1217557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219697">SUSE bug 1219697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-29"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217277">SUSE bug 1217277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814270" comment="gnutls-3.7.3-150400.4.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814271" comment="libgnutls30-3.7.3-150400.4.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814272" comment="libgnutls30-hmac-3.7.3-150400.4.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5992</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5992" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1402-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018599.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219386">SUSE bug 1219386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856057" comment="opensc-0.22.0-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218209">SUSE bug 1218209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6040</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6121</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6129</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6129" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
    <description>
    Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications running
on PowerPC CPU based platforms if the CPU provides vector instructions.

Impact summary: If an attacker can influence whether the POLY1305 MAC
algorithm is used, the application state might be corrupted with various
application dependent consequences.

The POLY1305 MAC (message authentication code) implementation in OpenSSL for
PowerPC CPUs restores the contents of vector registers in a different order
than they are saved. Thus the contents of some of these vector registers
are corrupted when returning to the caller. The vulnerable code is used only
on newer PowerPC processors supporting the PowerISA 2.07 instructions.

The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However unless the compiler uses the vector registers for storing
pointers, the most likely consequence, if any, would be an incorrect result
of some application dependent calculations or a crash leading to a denial of
service.

The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3. If this cipher is enabled on the server a malicious
client can influence whether this AEAD cipher is used. This implies that
TLS server applications using OpenSSL can be potentially impacted. However
we are currently not aware of any concrete application that would be affected
by this issue therefore we consider this a Low severity security issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218690">SUSE bug 1218690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846771" comment="libopenssl3-3.0.8-150400.4.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6176</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217522">SUSE bug 1217522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6237</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long invalid RSA public keys may take
a long time.

Impact summary: Applications that use the function EVP_PKEY_public_check()
to check RSA public keys may experience long delays. Where the key that
is being checked has been obtained from an untrusted source this may lead
to a Denial of Service.

When function EVP_PKEY_public_check() is called on RSA public keys,
a computation is done to confirm that the RSA modulus, n, is composite.
For valid RSA keys, n is a product of two or more large primes and this
computation completes quickly. However, if n is an overly large prime,
then this computation would take a long time.

An application that calls EVP_PKEY_public_check() and supplies an RSA key
obtained from an untrusted source could be vulnerable to a Denial of Service
attack.

The function EVP_PKEY_public_check() is not called from other OpenSSL
functions however it is called from the OpenSSL pkey command line
application. For that reason that application is also vulnerable if used
with the '-pubin' and '-check' options on untrusted data.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218810">SUSE bug 1218810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846771" comment="libopenssl3-3.0.8-150400.4.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6270</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218813">SUSE bug 1218813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227675">SUSE bug 1227675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6356</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218487">SUSE bug 1218487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6536</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222685">SUSE bug 1222685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
    <description>
    An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.

The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224879">SUSE bug 1224879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225185">SUSE bug 1225185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851284" comment="libpython3_6m1_0-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851285" comment="python3-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851286" comment="python3-base-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6606</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6683</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6683" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218889">SUSE bug 1218889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856046" comment="qemu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855895" comment="qemu-accel-tcg-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855896" comment="qemu-arm-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856047" comment="qemu-audio-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856048" comment="qemu-chardev-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856049" comment="qemu-guest-agent-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856050" comment="qemu-hw-display-qxl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856051" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856052" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856053" comment="qemu-hw-usb-redirect-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855913" comment="qemu-ipxe-1.0.0+-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855948" comment="qemu-s390x-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855917" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855918" comment="qemu-sgabios-8-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856054" comment="qemu-tools-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856055" comment="qemu-ui-opengl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856056" comment="qemu-ui-spice-core-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855925" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855926" comment="qemu-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218186">SUSE bug 1218186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.

A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().

We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214158">SUSE bug 1214158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017889.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.

A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.

We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218255">SUSE bug 1218255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7042</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue could be exploited to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227675">SUSE bug 1227675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7207</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0305-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0305-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018137.html" source="SUSE-SU"/>
    <description>
    Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-27"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009845234" comment="cpio-2.13-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0340</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218689">SUSE bug 1218689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0397</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    A defect was discovered in the Python "ssl" module where there is a memory
race condition with the ssl.SSLContext methods "cert_store_stats()" and
"get_ca_certs()". The race condition can be triggered if the methods are
called at the same time as certificates are loaded into the SSLContext,
such as during the TLS handshake with a certificate directory configured.
This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226447">SUSE bug 1226447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9192" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
    <description>
    An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.

The zipfile module is vulnerable to "quoted-overlap" zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0553</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0638-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849010" comment="gnutls-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849011" comment="libgnutls30-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849012" comment="libgnutls30-hmac-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0565</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219078">SUSE bug 1219078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0638-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218862">SUSE bug 1218862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849010" comment="gnutls-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849011" comment="libgnutls30-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849012" comment="libgnutls30-hmac-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0639</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0639" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel's SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0641</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel's TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018143.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850762" comment="libopenssl-1_1-devel-1.1.1l-150400.7.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850763" comment="libopenssl1_1-1.1.1l-150400.7.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850764" comment="libopenssl1_1-hmac-1.1.1l-150400.7.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846771" comment="libopenssl3-3.0.8-150400.4.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850765" comment="openssl-1_1-1.1.1l-150400.7.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-06-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219082">SUSE bug 1219082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.

We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219432">SUSE bug 1219432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1086</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-06-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219435">SUSE bug 1219435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226066">SUSE bug 1226066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1151</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-29"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853562" comment="cni-0.7.1-150100.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280793" comment="cni is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853563" comment="cni-plugins-0.8.6-150100.3.22.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280794" comment="cni-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852540" comment="podman-4.4.4-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852433" comment="podman-cni-config-4.4.4-150400.4.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266792" comment="podman-cni-config is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2004" ref_url="https://www.suse.com/security/cve/CVE-2024-2004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036553.html" source="SUSE-SU"/>
    <description>
    When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2004/">CVE-2024-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221665">SUSE bug 1221665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853567" comment="curl-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853568" comment="libcurl4-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20696</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20696" ref_url="https://www.suse.com/security/cve/CVE-2024-20696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2171-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14378-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YCGP76JWUXZIFMZWPNZW6VGRR63DPRBV/" source="SUSE-SU"/>
    <description>
    Windows libarchive Remote Code Execution Vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-23"/>
	<updated date="2024-10-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-20696/">CVE-2024-20696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20696">CVE-2024-20696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225971">SUSE bug 1225971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225972">SUSE bug 1225972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868679" comment="libarchive13-3.5.1-150400.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21626</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" source="SUSE-SU"/>
		<reference ref_id="TID000021363" ref_url="https://www.suse.com/support/kb/doc/?id=000021363" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. 
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847023" comment="runc-1.1.12-150000.61.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2193" ref_url="https://www.suse.com/security/cve/CVE-2024-2193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
    <description>
    A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2193/">CVE-2024-2193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2193">CVE-2024-2193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217857">SUSE bug 1217857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853080" comment="xen-libs-4.16.5_14-150400.4.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2201</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="TID000021421" ref_url="https://www.suse.com/support/kb/doc/?id=000021421" source="SUSE-SU"/>
    <description>
    A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212111">SUSE bug 1212111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854660" comment="xen-libs-4.16.6_02-150400.4.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22099</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.

This issue affects Linux kernel: v2.6.12-rc2.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218722">SUSE bug 1218722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863244" comment="python3-Jinja2-2.10.1-150000.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253389" comment="python3-Jinja2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22231</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22231" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22231" ref_url="https://www.suse.com/security/cve/CVE-2024-22231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202404:15254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035156.html" source="SUSE-SU"/>
		<reference ref_id="TID000021368" ref_url="https://www.suse.com/support/kb/doc/?id=000021368" source="SUSE-SU"/>
    <description>
    Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-06-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22231/">CVE-2024-22231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22231">CVE-2024-22231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219430">SUSE bug 1219430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847038" comment="python3-salt-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847039" comment="salt-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847040" comment="salt-minion-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847041" comment="salt-transactional-update-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22232" ref_url="https://www.suse.com/security/cve/CVE-2024-22232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202404:15254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035156.html" source="SUSE-SU"/>
		<reference ref_id="TID000021368" ref_url="https://www.suse.com/support/kb/doc/?id=000021368" source="SUSE-SU"/>
    <description>
    A specially crafted url can be created which leads to a directory traversal in the salt file server.
A malicious user can read an arbitrary file from a Salt master's filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-06-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22232/">CVE-2024-22232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22232">CVE-2024-22232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219431">SUSE bug 1219431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847038" comment="python3-salt-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847039" comment="salt-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847040" comment="salt-minion-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847041" comment="salt-transactional-update-3006.0-150400.8.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22365</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0136-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017680.html" source="SUSE-SU"/>
    <description>
    linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-07-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218475">SUSE bug 1218475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819897" comment="pam-1.3.0-150000.6.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22667" ref_url="https://www.suse.com/security/cve/CVE-2024-22667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22667/">CVE-2024-22667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22667">CVE-2024-22667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219581">SUSE bug 1219581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224870">SUSE bug 1224870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23307</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220145">SUSE bug 1220145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
    <description>
    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219267">SUSE bug 1219267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848741" comment="docker-24.0.7_ce-150000.193.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23652" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
    <description>
    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219268">SUSE bug 1219268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848741" comment="docker-24.0.7_ce-150000.193.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23653</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23653" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:4391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XZ7QNLFOMP7ZODQGCLQFRNRPEWZELNY/" source="SUSE-SU"/>
    <description>
    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. 

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219438">SUSE bug 1219438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848741" comment="docker-24.0.7_ce-150000.193.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23850</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-&gt;data_size check. This is related to ctl_ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2398</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036553.html" source="SUSE-SU"/>
    <description>
    When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221667">SUSE bug 1221667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853567" comment="curl-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853568" comment="libcurl4-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24474</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24474" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24474" ref_url="https://www.suse.com/security/cve/CVE-2024-24474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
    <description>
    QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24474/">CVE-2024-24474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24474">CVE-2024-24474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220134">SUSE bug 1220134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856046" comment="qemu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855895" comment="qemu-accel-tcg-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855896" comment="qemu-arm-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856047" comment="qemu-audio-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856048" comment="qemu-chardev-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856049" comment="qemu-guest-agent-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856050" comment="qemu-hw-display-qxl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856051" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856052" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856053" comment="qemu-hw-usb-redirect-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855913" comment="qemu-ipxe-1.0.0+-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855948" comment="qemu-s390x-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855917" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855918" comment="qemu-sgabios-8-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856054" comment="qemu-tools-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856055" comment="qemu-ui-opengl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856056" comment="qemu-ui-spice-core-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855925" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855926" comment="qemu-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24786</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2025-01-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868400" comment="podman-4.9.5-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.





    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2494</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034895.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221815">SUSE bug 1221815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853062" comment="libvirt-client-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853063" comment="libvirt-daemon-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853064" comment="libvirt-daemon-driver-interface-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853065" comment="libvirt-daemon-driver-network-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853066" comment="libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853067" comment="libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853068" comment="libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853069" comment="libvirt-daemon-driver-secret-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853070" comment="libvirt-daemon-driver-storage-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853071" comment="libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853072" comment="libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853073" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853074" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853075" comment="libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853076" comment="libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852838" comment="libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853077" comment="libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853078" comment="libvirt-daemon-qemu-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853079" comment="libvirt-libs-8.0.0-150400.7.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25062</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0461-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0613-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035534.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219575">SUSE bug 1219575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848936" comment="libxml2-2-2.9.14-150400.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848937" comment="libxml2-tools-2.9.14-150400.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848938" comment="python3-libxml2-2.9.14-150400.5.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2511</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html" source="SUSE-SU"/>
    <description>
    Issue summary: Some non-default TLS server configurations can cause unbounded
memory growth when processing TLSv1.3 sessions

Impact summary: An attacker may exploit certain server configurations to trigger
unbounded memory growth that would lead to a Denial of Service

This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is
being used (but not if early_data support is also configured and the default
anti-replay protection is in use). In this case, under certain conditions, the
session cache can get into an incorrect state and it will fail to flush properly
as it fills. The session cache will continue to grow in an unbounded manner. A
malicious client could deliberately create the scenario for this failure to
force a Denial of Service. It may also happen by accident in normal operation.

This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS
clients.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL
1.0.2 is also not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-08"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865158" comment="libopenssl-1_1-devel-1.1.1l-150400.7.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865159" comment="libopenssl1_1-1.1.1l-150400.7.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865160" comment="libopenssl1_1-hmac-1.1.1l-150400.7.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864952" comment="libopenssl3-3.0.8-150400.4.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865161" comment="openssl-1_1-1.1.1l-150400.7.66.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1136-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035974.html" source="SUSE-SU"/>
    <description>
    c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-07-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220279">SUSE bug 1220279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853561" comment="libcares2-1.19.1-150000.3.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26458</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852271" comment="krb5-1.19.2-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26461</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-11-22"/>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220771">SUSE bug 1220771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852271" comment="krb5-1.19.2-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26585</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between tx work scheduling and socket close

Similarly to previous commit, the submitting thread (recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete().
Reorder scheduling the work before calling complete().
This seems more logical in the first place, as it's
the inverse order of what the submitting thread will do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220211">SUSE bug 1220211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix stack corruption

When tc filters are first added to a net device, the corresponding local
port gets bound to an ACL group in the device. The group contains a list
of ACLs. In turn, each ACL points to a different TCAM region where the
filters are stored. During forwarding, the ACLs are sequentially
evaluated until a match is found.

One reason to place filters in different regions is when they are added
with decreasing priorities and in an alternating order so that two
consecutive filters can never fit in the same region because of their
key usage.

In Spectrum-2 and newer ASICs the firmware started to report that the
maximum number of ACLs in a group is more than 16, but the layout of the
register that configures ACL groups (PAGT) was not updated to account
for that. It is therefore possible to hit stack corruption [1] in the
rare case where more than 16 ACLs in a group are required.

Fix by limiting the maximum ACL group size to the minimum between what
the firmware reports and the maximum ACLs that fit in the PAGT register.

Add a test case to make sure the machine does not crash when this
condition is hit.

[1]
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120
[...]
 dump_stack_lvl+0x36/0x50
 panic+0x305/0x330
 __stack_chk_fail+0x15/0x20
 mlxsw_sp_acl_tcam_group_update+0x116/0x120
 mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110
 mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20
 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
 mlxsw_sp_acl_rule_add+0x47/0x240
 mlxsw_sp_flower_replace+0x1a9/0x1d0
 tc_setup_cb_add+0xdc/0x1c0
 fl_hw_replace_filter+0x146/0x1f0
 fl_change+0xc17/0x1360
 tc_new_tfilter+0x472/0xb90
 rtnetlink_rcv_msg+0x313/0x3b0
 netlink_rcv_skb+0x58/0x100
 netlink_unicast+0x244/0x390
 netlink_sendmsg+0x1e4/0x440
 ____sys_sendmsg+0x164/0x260
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xc0
 do_syscall_64+0x40/0xe0
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26589</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS

For PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off
for validation. However, variable offset ptr alu is not prohibited
for this ptr kind. So the variable offset is not checked.

The following prog is accepted:

  func#0 @0
  0: R1=ctx() R10=fp0
  0: (bf) r6 = r1                       ; R1=ctx() R6_w=ctx()
  1: (79) r7 = *(u64 *)(r6 +144)        ; R6_w=ctx() R7_w=flow_keys()
  2: (b7) r8 = 1024                     ; R8_w=1024
  3: (37) r8 /= 1                       ; R8_w=scalar()
  4: (57) r8 &amp;= 1024                    ; R8_w=scalar(smin=smin32=0,
  smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))
  5: (0f) r7 += r8
  mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1
  mark_precise: frame0: regs=r8 stack= before 4: (57) r8 &amp;= 1024
  mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1
  mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024
  6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off
  =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,
  var_off=(0x0; 0x400))
  6: (79) r0 = *(u64 *)(r7 +0)          ; R0_w=scalar()
  7: (95) exit

This prog loads flow_keys to r7, and adds the variable offset r8
to r7, and finally causes out-of-bounds access:

  BUG: unable to handle page fault for address: ffffc90014c80038
  [...]
  Call Trace:
   &lt;TASK&gt;
   bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]
   __bpf_prog_run include/linux/filter.h:651 [inline]
   bpf_prog_run include/linux/filter.h:658 [inline]
   bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]
   bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991
   bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359
   bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]
   __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475
   __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]
   __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]
   __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x63/0x6b

Fix this by rejecting ptr alu with variable offset on flow_keys.
Applying the patch rejects the program with "R7 pointer arithmetic
on flow_keys prohibited".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix re-attachment branch in bpf_tracing_prog_attach

The following case can cause a crash due to missing attach_btf:

1) load rawtp program
2) load fentry program with rawtp as target_fd
3) create tracing link for fentry program with target_fd = 0
4) repeat 3

In the end we have:

- prog-&gt;aux-&gt;dst_trampoline == NULL
- tgt_prog == NULL (because we did not provide target_fd to link_create)
- prog-&gt;aux-&gt;attach_btf == NULL (the program was loaded with attach_prog_fd=X)
- the program was loaded for tgt_prog but we have no way to find out which one

    BUG: kernel NULL pointer dereference, address: 0000000000000058
    Call Trace:
     &lt;TASK&gt;
     ? __die+0x20/0x70
     ? page_fault_oops+0x15b/0x430
     ? fixup_exception+0x22/0x330
     ? exc_page_fault+0x6f/0x170
     ? asm_exc_page_fault+0x22/0x30
     ? bpf_tracing_prog_attach+0x279/0x560
     ? btf_obj_id+0x5/0x10
     bpf_tracing_prog_attach+0x439/0x560
     __sys_bpf+0x1cf4/0x2de0
     __x64_sys_bpf+0x1c/0x30
     do_syscall_64+0x41/0xf0
     entry_SYSCALL_64_after_hwframe+0x6e/0x76

Return -EINVAL in this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: i801: Fix block process call transactions

According to the Intel datasheets, software must reset the block
buffer index twice for block process call transactions: once before
writing the outgoing data to the buffer, and once again before
reading the incoming data from the buffer.

The driver is currently missing the second reset, causing the wrong
portion of the block buffer to be read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26595</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26595" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path

When calling mlxsw_sp_acl_tcam_region_destroy() from an error path after
failing to attach the region to an ACL group, we hit a NULL pointer
dereference upon 'region-&gt;group-&gt;tcam' [1].

Fix by retrieving the 'tcam' pointer using mlxsw_sp_acl_to_tcam().

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
RIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0
[...]
Call Trace:
 mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20
 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
 mlxsw_sp_acl_rule_add+0x47/0x240
 mlxsw_sp_flower_replace+0x1a9/0x1d0
 tc_setup_cb_add+0xdc/0x1c0
 fl_hw_replace_filter+0x146/0x1f0
 fl_change+0xc17/0x1360
 tc_new_tfilter+0x472/0xb90
 rtnetlink_rcv_msg+0x313/0x3b0
 netlink_rcv_skb+0x58/0x100
 netlink_unicast+0x244/0x390
 netlink_sendmsg+0x1e4/0x440
 ____sys_sendmsg+0x164/0x260
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xc0
 do_syscall_64+0x40/0xe0
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache

There is a potential UAF scenario in the case of an LPI translation
cache hit racing with an operation that invalidates the cache, such
as a DISCARD ITS command. The root of the problem is that
vgic_its_check_cache() does not elevate the refcount on the vgic_irq
before dropping the lock that serializes refcount changes.

Have vgic_its_check_cache() raise the refcount on the returned vgic_irq
and add the corresponding decrement after queueing the interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221129">SUSE bug 1221129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP

If the external phy working together with phy-omap-usb2 does not implement
send_srp(), we may still attempt to call it. This can happen on an idle
Ethernet gadget triggering a wakeup for example:

configfs-gadget.g1 gadget.0: ECM Suspend
configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup
...
Unable to handle kernel NULL pointer dereference at virtual address
00000000 when execute
...
PC is at 0x0
LR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]
...
musb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]
usb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]
eth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c
dev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4
sch_direct_xmit from __dev_queue_xmit+0x334/0xd88
__dev_queue_xmit from arp_solicit+0xf0/0x268
arp_solicit from neigh_probe+0x54/0x7c
neigh_probe from __neigh_event_send+0x22c/0x47c
__neigh_event_send from neigh_resolve_output+0x14c/0x1c0
neigh_resolve_output from ip_finish_output2+0x1c8/0x628
ip_finish_output2 from ip_send_skb+0x40/0xd8
ip_send_skb from udp_send_skb+0x124/0x340
udp_send_skb from udp_sendmsg+0x780/0x984
udp_sendmsg from __sys_sendto+0xd8/0x158
__sys_sendto from ret_fast_syscall+0x0/0x58

Let's fix the issue by checking for send_srp() and set_vbus() before
calling them. For USB peripheral only cases these both could be NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: regenerate buddy after block freeing failed if under fc replay

This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant
mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on
code in mb_free_blocks(), fast commit replay can end up marking as free
blocks that are already marked as such. This causes corruption of the
buddy bitmap so we need to regenerate it in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/membarrier: reduce the ability to hammer on sys_membarrier

On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything.  So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Stop relying on userspace for info to fault in xsave buffer

Before this change, the expected size of the user space buffer was
taken from fx_sw-&gt;xstate_size. fx_sw-&gt;xstate_size can be changed
from user-space, so it is possible construct a sigreturn frame where:

 * fx_sw-&gt;xstate_size is smaller than the size required by valid bits in
   fx_sw-&gt;xfeatures.
 * user-space unmaps parts of the sigrame fpu buffer so that not all of
   the buffer required by xrstor is accessible.

In this case, xrstor tries to restore and accesses the unmapped area
which results in a fault. But fault_in_readable succeeds because buf +
fx_sw-&gt;xstate_size is within the still mapped area, so it goes back and
tries xrstor again. It will spin in this loop forever.

Instead, fault in the maximum size which can be touched by XRSTOR (taken
from fpstate-&gt;user_size).

[ dhansen: tweak subject / changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: sii902x: Fix probing race issue

A null pointer dereference crash has been observed rarely on TI
platforms using sii9022 bridge:

[   53.271356]  sii902x_get_edid+0x34/0x70 [sii902x]
[   53.276066]  sii902x_bridge_get_edid+0x14/0x20 [sii902x]
[   53.281381]  drm_bridge_get_edid+0x20/0x34 [drm]
[   53.286305]  drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]
[   53.292955]  drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]
[   53.300510]  drm_client_modeset_probe+0x1f0/0xbd4 [drm]
[   53.305958]  __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]
[   53.313611]  drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]
[   53.320039]  drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]
[   53.326401]  drm_client_register+0x5c/0xa0 [drm]
[   53.331216]  drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]
[   53.336881]  tidss_probe+0x128/0x264 [tidss]
[   53.341174]  platform_probe+0x68/0xc4
[   53.344841]  really_probe+0x188/0x3c4
[   53.348501]  __driver_probe_device+0x7c/0x16c
[   53.352854]  driver_probe_device+0x3c/0x10c
[   53.357033]  __device_attach_driver+0xbc/0x158
[   53.361472]  bus_for_each_drv+0x88/0xe8
[   53.365303]  __device_attach+0xa0/0x1b4
[   53.369135]  device_initial_probe+0x14/0x20
[   53.373314]  bus_probe_device+0xb0/0xb4
[   53.377145]  deferred_probe_work_func+0xcc/0x124
[   53.381757]  process_one_work+0x1f0/0x518
[   53.385770]  worker_thread+0x1e8/0x3dc
[   53.389519]  kthread+0x11c/0x120
[   53.392750]  ret_from_fork+0x10/0x20

The issue here is as follows:

- tidss probes, but is deferred as sii902x is still missing.
- sii902x starts probing and enters sii902x_init().
- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from
  DRM's perspective.
- sii902x calls sii902x_audio_codec_init() and
  platform_device_register_data()
- The registration of the audio platform device causes probing of the
  deferred devices.
- tidss probes, which eventually causes sii902x_bridge_get_edid() to be
  called.
- sii902x_bridge_get_edid() tries to use the i2c to read the edid.
  However, the sii902x driver has not set up the i2c part yet, leading
  to the crash.

Fix this by moving the drm_bridge_add() to the end of the
sii902x_init(), which is also at the very end of sii902x_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix a memory corruption

iwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that
if we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in
bytes, we'll write past the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221302">SUSE bug 1221302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26614</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: make sure init the accept_queue's spinlocks once

When I run syz's reproduction C program locally, it causes the following
issue:
pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!
WARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
Code: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7
30 20 ce 8f e8 ad 56 42 ff &lt;0f&gt; 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90
RSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900
RBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff
R10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000
R13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000
FS:  00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0
Call Trace:
&lt;IRQ&gt;
  _raw_spin_unlock (kernel/locking/spinlock.c:186)
  inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321)
  inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358)
  tcp_check_req (net/ipv4/tcp_minisocks.c:868)
  tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260)
  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205)
  ip_local_deliver_finish (net/ipv4/ip_input.c:234)
  __netif_receive_skb_one_core (net/core/dev.c:5529)
  process_backlog (./include/linux/rcupdate.h:779)
  __napi_poll (net/core/dev.c:6533)
  net_rx_action (net/core/dev.c:6604)
  __do_softirq (./arch/x86/include/asm/jump_label.h:27)
  do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)
&lt;/IRQ&gt;
&lt;TASK&gt;
  __local_bh_enable_ip (kernel/softirq.c:381)
  __dev_queue_xmit (net/core/dev.c:4374)
  ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)
  __ip_queue_xmit (net/ipv4/ip_output.c:535)
  __tcp_transmit_skb (net/ipv4/tcp_output.c:1462)
  tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469)
  tcp_rcv_state_process (net/ipv4/tcp_input.c:6657)
  tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929)
  __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968)
  release_sock (net/core/sock.c:3536)
  inet_wait_for_connect (net/ipv4/af_inet.c:609)
  __inet_stream_connect (net/ipv4/af_inet.c:702)
  inet_stream_connect (net/ipv4/af_inet.c:748)
  __sys_connect (./include/linux/file.h:45 net/socket.c:2064)
  __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070)
  do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
  RIP: 0033:0x7fa10ff05a3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89
  c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48
  RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a
  RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d
  RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003
  RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640
  R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20
&lt;/TASK&gt;

The issue triggering process is analyzed as follows:
Thread A                                       Thread B
tcp_v4_rcv	//receive ack TCP packet       inet_shutdown
  tcp_check_req                                  tcp_disconnect //disconnect sock
  ...                                              tcp_set_state(sk, TCP_CLOSE)
    inet_csk_complete_hashdance                ...
      inet_csk_reqsk_queue_add         
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tomoyo: fix UAF write bug in tomoyo_write_control()

Since tomoyo_write_control() updates head-&gt;write_buf when write()
of long lines is requested, we need to fetch head-&gt;write_buf after
head-&gt;io_sem is held.  Otherwise, concurrent write() requests can
cause use-after-free-write and double-free problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220828">SUSE bug 1220828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26642</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow anonymous set with timeout flag

Anonymous sets are never used with timeout from userspace, reject this.
Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26687</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/events: close evtchn after mapping cleanup

shutdown_pirq and startup_pirq are not taking the
irq_mapping_update_lock because they can't due to lock inversion. Both
are called with the irq_desc-&gt;lock being taking. The lock order,
however, is first irq_mapping_update_lock and then irq_desc-&gt;lock.

This opens multiple races:
- shutdown_pirq can be interrupted by a function that allocates an event
  channel:

  CPU0                        CPU1
  shutdown_pirq {
    xen_evtchn_close(e)
                              __startup_pirq {
                                EVTCHNOP_bind_pirq
                                  -&gt; returns just freed evtchn e
                                set_evtchn_to_irq(e, irq)
                              }
    xen_irq_info_cleanup() {
      set_evtchn_to_irq(e, -1)
    }
  }

  Assume here event channel e refers here to the same event channel
  number.
  After this race the evtchn_to_irq mapping for e is invalid (-1).

- __startup_pirq races with __unbind_from_irq in a similar way. Because
  __startup_pirq doesn't take irq_mapping_update_lock it can grab the
  evtchn that __unbind_from_irq is currently freeing and cleaning up. In
  this case even though the event channel is allocated, its mapping can
  be unset in evtchn_to_irq.

The fix is to first cleanup the mappings and then close the event
channel. In this way, when an event channel gets allocated it's
potential previous evtchn_to_irq mappings are guaranteed to be unset already.
This is also the reverse order of the allocation where first the event
channel is allocated and then the mappings are setup.

On a 5.10 kernel prior to commit 3fcdaf3d7634 ("xen/events: modify internal
[un]bind interfaces"), we hit a BUG like the following during probing of NVMe
devices. The issue is that during nvme_setup_io_queues, pci_free_irq
is called for every device which results in a call to shutdown_pirq.
With many nvme devices it's therefore likely to hit this race during
boot because there will be multiple calls to shutdown_pirq and
startup_pirq are running potentially in parallel.

  ------------[ cut here ]------------
  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled
  kernel BUG at drivers/xen/events/events_base.c:499!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1
  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006
  Workqueue: nvme-reset-wq nvme_reset_work
  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0
  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff &lt;0f&gt; 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00
  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006
  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff
  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00
  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed
  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002
  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? set_affinity_irq+0xdc/0x1c0
   ? __die_body.cold+0x8/0xd
   ? die+0x2b/0x50
   ? do_trap+0x90/0x110
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? do_error_trap+0x65/0x80
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? exc_invalid_op+0x4e/0x70
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? asm_exc_invalid_op+0x12/0x20
   ? bind_evtchn_to_cpu+0xdf/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26688</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super

When configuring a hugetlb filesystem via the fsconfig() syscall, there is
a possible NULL dereference in hugetlbfs_fill_super() caused by assigning
NULL to ctx-&gt;hstate in hugetlbfs_parse_param() when the requested pagesize
is non valid.

E.g: Taking the following steps:

     fd = fsopen("hugetlbfs", FSOPEN_CLOEXEC);
     fsconfig(fd, FSCONFIG_SET_STRING, "pagesize", "1024", 0);
     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);

Given that the requested "pagesize" is invalid, ctxt-&gt;hstate will be replaced
with NULL, losing its previous value, and we will print an error:

 ...
 ...
 case Opt_pagesize:
 ps = memparse(param-&gt;string, &amp;rest);
 ctx-&gt;hstate = h;
 if (!ctx-&gt;hstate) {
         pr_err("Unsupported page size %lu MB\n", ps / SZ_1M);
         return -EINVAL;
 }
 return 0;
 ...
 ...

This is a problem because later on, we will dereference ctxt-&gt;hstate in
hugetlbfs_fill_super()

 ...
 ...
 sb-&gt;s_blocksize = huge_page_size(ctx-&gt;hstate);
 ...
 ...

Causing below Oops.

Fix this by replacing cxt-&gt;hstate value only when then pagesize is known
to be valid.

 kernel: hugetlbfs: Unsupported page size 0 MB
 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028
 kernel: #PF: supervisor read access in kernel mode
 kernel: #PF: error_code(0x0000) - not-present page
 kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0
 kernel: Oops: 0000 [#1] PREEMPT SMP PTI
 kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f
 kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017
 kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0
 kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 &lt;8b&gt; 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28
 kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246
 kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004
 kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000
 kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004
 kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000
 kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400
 kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die_body+0x1a/0x60
 kernel:  ? page_fault_oops+0x16f/0x4a0
 kernel:  ? search_bpf_extables+0x65/0x70
 kernel:  ? fixup_exception+0x22/0x310
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0
 kernel:  ? hugetlbfs_fill_super+0x28/0x1a0
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  vfs_get_super+0x40/0xa0
 kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10
 kernel:  vfs_get_tree+0x25/0xd0
 kernel:  vfs_cmd_create+0x64/0xe0
 kernel:  __x64_sys_fsconfig+0x395/0x410
 kernel:  do_syscall_64+0x80/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76
 kernel: RIP: 0033:0x7ffbc0cb87c9
 kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48
 kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af
 kernel: RAX: fffffffffff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26689</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: prevent use-after-free in encode_cap_msg()

In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was
caught by KASAN at this line - 'ceph_buffer_get(arg-&gt;xattr_buf);'. This
implies before the refcount could be increment here, it was freed.

In same file, in "handle_cap_grant()" refcount is decremented by this
line - 'ceph_buffer_put(ci-&gt;i_xattrs.blob);'. It appears that a race
occurred and resource was freed by the latter line before the former
line could increment it.

encode_cap_msg() is called by __send_cap() and __send_cap() is called by
ceph_check_caps() after calling __prep_cap(). __prep_cap() is where
arg-&gt;xattr_buf is assigned to ci-&gt;i_xattrs.blob. This is the spot where
the refcount must be increased to prevent "use after free" error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26704</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double-free of blocks due to wrong extents moved_len

In ext4_move_extents(), moved_len is only updated when all moves are
successfully executed, and only discards orig_inode and donor_inode
preallocations when moved_len is not zero. When the loop fails to exit
after successfully moving some extents, moved_len is not updated and
remains at 0, so it does not discard the preallocations.

If the moved extents overlap with the preallocated extents, the
overlapped extents are freed twice in ext4_mb_release_inode_pa() and
ext4_process_freed_data() (as described in commit 94d7c16cbbbd ("ext4:
Fix double-free of blocks with EXT4_IOC_MOVE_EXT")), and bb_free is
incremented twice. Hence when trim is executed, a zero-division bug is
triggered in mb_update_avg_fragment_size() because bb_free is not zero
and bb_fragments is zero.

Therefore, update move_len after each extent move to avoid the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not ASSERT() if the newly created subvolume already got read

[BUG]
There is a syzbot crash, triggered by the ASSERT() during subvolume
creation:

 assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319
 ------------[ cut here ]------------
 kernel BUG at fs/btrfs/disk-io.c:1319!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60
  &lt;TASK&gt;
  btrfs_get_new_fs_root+0xd3/0xf0
  create_subvol+0xd02/0x1650
  btrfs_mksubvol+0xe95/0x12b0
  __btrfs_ioctl_snap_create+0x2f9/0x4f0
  btrfs_ioctl_snap_create+0x16b/0x200
  btrfs_ioctl+0x35f0/0x5cf0
  __x64_sys_ioctl+0x19d/0x210
  do_syscall_64+0x3f/0xe0
  entry_SYSCALL_64_after_hwframe+0x63/0x6b
 ---[ end trace 0000000000000000 ]---

[CAUSE]
During create_subvol(), after inserting root item for the newly created
subvolume, we would trigger btrfs_get_new_fs_root() to get the
btrfs_root of that subvolume.

The idea here is, we have preallocated an anonymous device number for
the subvolume, thus we can assign it to the new subvolume.

But there is really nothing preventing things like backref walk to read
the new subvolume.
If that happens before we call btrfs_get_new_fs_root(), the subvolume
would be read out, with a new anonymous device number assigned already.

In that case, we would trigger ASSERT(), as we really expect no one to
read out that subvolume (which is not yet accessible from the fs).
But things like backref walk is still possible to trigger the read on
the subvolume.

Thus our assumption on the ASSERT() is not correct in the first place.

[FIX]
Fix it by removing the ASSERT(), and just free the @anon_dev, reset it
to 0, and continue.

If the subvolume tree is read out by something else, it should have
already get a new anon_dev assigned thus we only need to free the
preallocated one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arp: Prevent overflow in arp_req_get().

syzkaller reported an overflown write in arp_req_get(). [0]

When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour
entry and copies neigh-&gt;ha to struct arpreq.arp_ha.sa_data.

The arp_ha here is struct sockaddr, not struct sockaddr_storage, so
the sa_data buffer is just 14 bytes.

In the splat below, 2 bytes are overflown to the next int field,
arp_flags.  We initialise the field just after the memcpy(), so it's
not a problem.

However, when dev-&gt;addr_len is greater than 22 (e.g. MAX_ADDR_LEN),
arp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)
in arp_ioctl() before calling arp_req_get().

To avoid the overflow, let's limit the max length of memcpy().

Note that commit b5f0de6df6dc ("net: dev: Convert sa_data to flexible
array in struct sockaddr") just silenced syzkaller.

[0]:
memcpy: detected field-spanning write (size 16) of single field "r-&gt;arp_ha.sa_data" at net/ipv4/arp.c:1128 (size 14)
WARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Modules linked in:
CPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014
RIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Code: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb &lt;0f&gt; 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6
RSP: 0018:ffffc900050b7998 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001
RBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000
R13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010
FS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261
 inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981
 sock_do_ioctl+0xdf/0x260 net/socket.c:1204
 sock_ioctl+0x3ef/0x650 net/socket.c:1321
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x64/0xce
RIP: 0033:0x7f172b262b8d
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d
RDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003
RBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: don't override retval if we already lost the skb

If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.

Move the retval override to the error path which actually need it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26764</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio

If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the
following kernel warning appears:

WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8
Call trace:
 kiocb_set_cancel_fn+0x9c/0xa8
 ffs_epfile_read_iter+0x144/0x1d0
 io_read+0x19c/0x498
 io_issue_sqe+0x118/0x27c
 io_submit_sqes+0x25c/0x5fc
 __arm64_sys_io_uring_enter+0x104/0xab0
 invoke_syscall+0x58/0x11c
 el0_svc_common+0xb4/0xf4
 do_el0_svc+0x2c/0xb0
 el0_svc+0x2c/0xa4
 el0t_64_sync_handler+0x68/0xb4
 el0t_64_sync+0x1a4/0x1a8

Fix this by setting the IOCB_AIO_RW flag for read and write I/O that is
submitted by libaio.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one error

Unfortunately the commit `fd8958efe877` introduced another error
causing the `descs` array to overflow. This reults in further crashes
easily reproducible by `sendmsg` system call.

[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI
[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]
--
[ 1080.974535] Call Trace:
[ 1080.976990]  &lt;TASK&gt;
[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]
[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]
[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]
[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]
[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210
--
[ 1081.148347]  __sys_sendmsg+0x59/0xa0

crash&gt; ipoib_txreq 0xffff9cfeba229f00
struct ipoib_txreq {
  txreq = {
    list = {
      next = 0xffff9cfeba229f00,
      prev = 0xffff9cfeba229f00
    },
    descp = 0xffff9cfeba229f40,
    coalesce_buf = 0x0,
    wait = 0xffff9cfea4e69a48,
    complete = 0xffffffffc0fe0760 &lt;hfi1_ipoib_sdma_complete&gt;,
    packet_len = 0x46d,
    tlen = 0x0,
    num_desc = 0x0,
    desc_limit = 0x6,
    next_descq_idx = 0x45c,
    coalesce_idx = 0x0,
    flags = 0x0,
    descs = {{
        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)
      }, {
        qw = {  0x3800014231b108, 0x4}
      }, {
        qw = { 0x310000e4ee0fcf0, 0x8}
      }, {
        qw = {  0x3000012e9f8000, 0x8}
      }, {
        qw = {  0x59000dfb9d0000, 0x8}
      }, {
        qw = {  0x78000e02e40000, 0x8}
      }}
  },
  sdma_hdr =  0x400300015528b000,  &lt;&lt;&lt; invalid pointer in the tx request structure
  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)
  complete = 0x0,
  priv = 0x0,
  txq = 0xffff9cfea4e69880,
  skb = 0xffff9d099809f400
}

If an SDMA send consists of exactly 6 descriptors and requires dword
padding (in the 7th descriptor), the sdma_txreq descriptor array is not
properly expanded and the packet will overflow into the container
structure. This results in a panic when the send completion runs. The
exact panic varies depending on what elements of the container structure
get corrupted. The fix is to use the correct expression in
_pad_sdma_tx_descs() to test the need to expand the descriptor array.

With this patch the crashes are no longer reproducible and the machine is
stable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222882">SUSE bug 1222882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26773</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()

Determine if the group block bitmap is corrupted before using ac_b_ex in
ext4_mb_try_best_found() to avoid allocating blocks from a group with a
corrupted block bitmap in the following concurrency and making the
situation worse.

ext4_mb_regular_allocator
  ext4_lock_group(sb, group)
  ext4_mb_good_group
   // check if the group bbitmap is corrupted
  ext4_mb_complex_scan_group
   // Scan group gets ac_b_ex but doesn't use it
  ext4_unlock_group(sb, group)
                           ext4_mark_group_bitmap_corrupted(group)
                           // The block bitmap was corrupted during
                           // the group unlock gap.
  ext4_mb_try_best_found
    ext4_lock_group(ac-&gt;ac_sb, group)
    ext4_mb_use_best_found
      mb_mark_used
      // Allocating blocks in block bitmap corrupted group
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26792</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double free of anonymous device after snapshot creation failure

When creating a snapshot we may do a double free of an anonymous device
in case there's an error committing the transaction. The second free may
result in freeing an anonymous device number that was allocated by some
other subsystem in the kernel or another btrfs filesystem.

The steps that lead to this:

1) At ioctl.c:create_snapshot() we allocate an anonymous device number
   and assign it to pending_snapshot-&gt;anon_dev;

2) Then we call btrfs_commit_transaction() and end up at
   transaction.c:create_pending_snapshot();

3) There we call btrfs_get_new_fs_root() and pass it the anonymous device
   number stored in pending_snapshot-&gt;anon_dev;

4) btrfs_get_new_fs_root() frees that anonymous device number because
   btrfs_lookup_fs_root() returned a root - someone else did a lookup
   of the new root already, which could some task doing backref walking;

5) After that some error happens in the transaction commit path, and at
   ioctl.c:create_snapshot() we jump to the 'fail' label, and after
   that we free again the same anonymous device number, which in the
   meanwhile may have been reallocated somewhere else, because
   pending_snapshot-&gt;anon_dev still has the same value as in step 1.

Recently syzbot ran into this and reported the following trace:

  ------------[ cut here ]------------
  ida_free called for id=51 which is not allocated.
  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525
  Modules linked in:
  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525
  Code: 10 42 80 3c 28 (...)
  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246
  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000
  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000
  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4
  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246
  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246
  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346
   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837
   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931
   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404
   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848
   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998
   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044
   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306
   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393
   btrfs_ioctl+0xa74/0xd40
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:871 [inline]
   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857
   do_syscall_64+0xfb/0x240
   entry_SYSCALL_64_after_hwframe+0x6f/0x77
  RIP: 0033:0x7fca3e67dda9
  Code: 28 00 00 00 (...)
  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9
  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658
   &lt;/TASK&gt;

Where we get an explicit message where we attempt to free an anonymous
device number that is not currently allocated. It happens in a different
code path from the example below, at btrfs_get_root_ref(), so this change
may not fix the case triggered by sy
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86, relocs: Ignore relocations in .notes section

When building with CONFIG_XEN_PV=y, .text symbols are emitted into
the .notes section so that Xen can find the "startup_xen" entry point.
This information is used prior to booting the kernel, so relocations
are not useful. In fact, performing relocations against the .notes
section means that the KASLR base is exposed since /sys/kernel/notes
is world-readable.

To avoid leaking the KASLR base without breaking unprivileged tools that
are expecting to read /sys/kernel/notes, skip performing relocations in
the .notes section. The values readable in .notes are then identical to
those found in System.map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix underflow in parse_server_interfaces()

In this loop, we step through the buffer and after each item we check
if the size_left is greater than the minimum size we need.  However,
the problem is that "bytes_left" is type ssize_t while sizeof() is type
size_t.  That means that because of type promotion, the comparison is
done as an unsigned and if we have negative bytes left the loop
continues instead of ending.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223363">SUSE bug 1223363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix memory leak in cachefiles_add_cache()

The following memory leak was reported after unbinding /dev/cachefiles:

==================================================================
unreferenced object 0xffff9b674176e3c0 (size 192):
  comm "cachefilesd2", pid 680, jiffies 4294881224
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc ea38a44b):
    [&lt;ffffffff8eb8a1a5&gt;] kmem_cache_alloc+0x2d5/0x370
    [&lt;ffffffff8e917f86&gt;] prepare_creds+0x26/0x2e0
    [&lt;ffffffffc002eeef&gt;] cachefiles_determine_cache_security+0x1f/0x120
    [&lt;ffffffffc00243ec&gt;] cachefiles_add_cache+0x13c/0x3a0
    [&lt;ffffffffc0025216&gt;] cachefiles_daemon_write+0x146/0x1c0
    [&lt;ffffffff8ebc4a3b&gt;] vfs_write+0xcb/0x520
    [&lt;ffffffff8ebc5069&gt;] ksys_write+0x69/0xf0
    [&lt;ffffffff8f6d4662&gt;] do_syscall_64+0x72/0x140
    [&lt;ffffffff8f8000aa&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76
==================================================================

Put the reference count of cache_cred in cachefiles_daemon_unbind() to
fix the problem. And also put cache_cred in cachefiles_add_cache() error
branch to avoid memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26852</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

syzbot found another use-after-free in ip6_route_mpath_notify() [1]

Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.

We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.

[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037

CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x167/0x540 mm/kasan/report.c:488
  kasan_report+0x142/0x180 mm/kasan/report.c:601
 rt6_fill_node+0x1460/0x1ac0
  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
 &lt;/TASK&gt;

Allocated by task 23037:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3981 [inline]
  __kmalloc+0x22e/0x490 mm/slub.c:3994
  kmalloc include/linux/slab.h:594 [inline]
  kzalloc include/linux/slab.h:711 [inline]
  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 16:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
  poison_slab_object+0xa6/0xe0 m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223059">SUSE bug 1223059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

packet: annotate data-races around ignore_outgoing

ignore_outgoing is read locklessly from dev_queue_xmit_nit()
and packet_getsockopt()

Add appropriate READ_ONCE()/WRITE_ONCE() annotations.

syzbot reported:

BUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt

write to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:
 packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003
 do_sock_setsockopt net/socket.c:2311 [inline]
 __sys_setsockopt+0x1d8/0x250 net/socket.c:2334
 __do_sys_setsockopt net/socket.c:2343 [inline]
 __se_sys_setsockopt net/socket.c:2340 [inline]
 __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

read to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:
 dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248
 xmit_one net/core/dev.c:3527 [inline]
 dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547
 __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108
 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127
 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]
 batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]
 batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335
 worker_thread+0x526/0x730 kernel/workqueue.c:3416
 kthread+0x1d1/0x210 kernel/kthread.c:388
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243

value changed: 0x00 -&gt; 0x01

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

This patch is against CVE-2023-6270. The description of cve is:

  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux
  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on
  `struct net_device`, and a use-after-free can be triggered by racing
  between the free on the struct and the access through the `skbtxq`
  global queue. This could lead to a denial of service condition or
  potential code execution.

In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial
code is finished. But the net_device ifp will still be used in
later tx()-&gt;dev_queue_xmit() in kthread. Which means that the
dev_put(ifp) should NOT be called in the success path of skb
initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into
use-after-free because the net_device is freed.

This patch removed the dev_put(ifp) in the success path in
aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223017">SUSE bug 1223017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security

During our fuzz testing of the connection and disconnection process at the
RFCOMM layer, we discovered this bug. By comparing the packets from a
normal connection and disconnection process with the testcase that
triggered a KASAN report. We analyzed the cause of this bug as follows:

1. In the packets captured during a normal connection, the host sends a
`Read Encryption Key Size` type of `HCI_CMD` packet
(Command Opcode: 0x1408) to the controller to inquire the length of
encryption key.After receiving this packet, the controller immediately
replies with a Command Completepacket (Event Code: 0x0e) to return the
Encryption Key Size.

2. In our fuzz test case, the timing of the controller's response to this
packet was delayed to an unexpected point: after the RFCOMM and L2CAP
layers had disconnected but before the HCI layer had disconnected.

3. After receiving the Encryption Key Size Response at the time described
in point 2, the host still called the rfcomm_check_security function.
However, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-&gt;chan-&gt;conn;`
had already been released, and when the function executed
`return hci_conn_security(conn-&gt;hcon, d-&gt;sec_level, auth_type, d-&gt;out);`,
specifically when accessing `conn-&gt;hcon`, a null-ptr-deref error occurred.

To fix this bug, check if `sk-&gt;sk_state` is BT_CLOSED before calling
rfcomm_recv_frame in rfcomm_process_rx.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: inet_defrag: prevent sk release while still in use

ip_local_out() and other functions can pass skb-&gt;sk as function argument.

If the skb is a fragment and reassembly happens before such function call
returns, the sk must not be released.

This affects skb fragments reassembled via netfilter or similar
modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.

Eric Dumazet made an initial analysis of this bug.  Quoting Eric:
  Calling ip_defrag() in output path is also implying skb_orphan(),
  which is buggy because output path relies on sk not disappearing.

  A relevant old patch about the issue was :
  8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()")

  [..]

  net/ipv4/ip_output.c depends on skb-&gt;sk being set, and probably to an
  inet socket, not an arbitrary one.

  If we orphan the packet in ipvlan, then downstream things like FQ
  packet scheduler will not work properly.

  We need to change ip_defrag() to only use skb_orphan() when really
  needed, ie whenever frag_list is going to be used.

Eric suggested to stash sk in fragment queue and made an initial patch.
However there is a problem with this:

If skb is refragmented again right after, ip_do_fragment() will copy
head-&gt;sk to the new fragments, and sets up destructor to sock_wfree.
IOW, we have no choice but to fix up sk_wmem accouting to reflect the
fully reassembled skb, else wmem will underflow.

This change moves the orphan down into the core, to last possible moment.
As ip_defrag_offset is aliased with sk_buff-&gt;sk member, we must move the
offset into the FRAG_CB, else skb-&gt;sk gets clobbered.

This allows to delay the orphaning long enough to learn if the skb has
to be queued or if the skb is completing the reasm queue.

In the former case, things work as before, skb is orphaned.  This is
safe because skb gets queued/stolen and won't continue past reasm engine.

In the latter case, we will steal the skb-&gt;sk reference, reattach it to
the head skb, and fix up wmem accouting when inet_frag inflates truesize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223139">SUSE bug 1223139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path

The commit mutex should not be released during the critical section
between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
worker could collect expired objects and get the released commit lock
within the same GC sequence.

nf_tables_module_autoload() temporarily releases the mutex to load
module dependencies, then it goes back to replay the transaction again.
Move it at the end of the abort phase after nft_gc_seq_end() is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224175">SUSE bug 1224175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26928</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_debug_files_proc_show()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223716">SUSE bug 1223716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer

Coverity scan reported potential risk of double free of the pointer
ha-&gt;vp_map.  ha-&gt;vp_map was freed in qla2x00_mem_alloc(), and again freed
in function qla2x00_mem_free(ha).

Assign NULL to vp_map and kfree take care of NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223681">SUSE bug 1223681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27043</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: edia: dvbdev: fix a use-after-free

In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:

budget_register
  |-&gt; dvb_dmxdev_init
        |-&gt; dvb_register_device
  |-&gt; dvb_dmxdev_release
        |-&gt; dvb_unregister_device
              |-&gt; dvb_remove_device
                    |-&gt; dvb_device_put
                          |-&gt; kref_put

When calling dvb_unregister_device, dmxdev-&gt;dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223825">SUSE bug 1223825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore: inode: Only d_invalidate() is needed

Unloading a modular pstore backend with records in pstorefs would
trigger the dput() double-drop warning:

  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410

Using the combo of d_drop()/dput() (as mentioned in
Documentation/filesystems/vfs.rst) isn't the right approach here, and
leads to the reference counting problem seen above. Use d_invalidate()
and update the code to not bother checking for error codes that can
never happen.

---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27398</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout

When the sco connection is established and then, the sco socket
is releasing, timeout_work will be scheduled to judge whether
the sco disconnection is timeout. The sock will be deallocated
later, but it is dereferenced again in sco_sock_timeout. As a
result, the use-after-free bugs will happen. The root cause is
shown below:

    Cleanup Thread               |      Worker Thread
sco_sock_release                 |
  sco_sock_close                 |
    __sco_sock_close             |
      sco_sock_set_timer         |
        schedule_delayed_work    |
  sco_sock_kill                  |    (wait a time)
    sock_put(sk) //FREE          |  sco_sock_timeout
                                 |    sock_hold(sk) //USE

The KASAN report triggered by POC is shown below:

[   95.890016] ==================================================================
[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0
[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7
...
[   95.890755] Workqueue: events sco_sock_timeout
[   95.890755] Call Trace:
[   95.890755]  &lt;TASK&gt;
[   95.890755]  dump_stack_lvl+0x45/0x110
[   95.890755]  print_address_description+0x78/0x390
[   95.890755]  print_report+0x11b/0x250
[   95.890755]  ? __virt_addr_valid+0xbe/0xf0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_report+0x139/0x170
[   95.890755]  ? update_load_avg+0xe5/0x9f0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_check_range+0x2c3/0x2e0
[   95.890755]  sco_sock_timeout+0x5e/0x1c0
[   95.890755]  process_one_work+0x561/0xc50
[   95.890755]  worker_thread+0xab2/0x13c0
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  kthread+0x279/0x300
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork+0x34/0x60
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork_asm+0x11/0x20
[   95.890755]  &lt;/TASK&gt;
[   95.890755]
[   95.890755] Allocated by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  __kasan_kmalloc+0x86/0x90
[   95.890755]  __kmalloc+0x17f/0x360
[   95.890755]  sk_prot_alloc+0xe1/0x1a0
[   95.890755]  sk_alloc+0x31/0x4e0
[   95.890755]  bt_sock_alloc+0x2b/0x2a0
[   95.890755]  sco_sock_create+0xad/0x320
[   95.890755]  bt_sock_create+0x145/0x320
[   95.890755]  __sock_create+0x2e1/0x650
[   95.890755]  __sys_socket+0xd0/0x280
[   95.890755]  __x64_sys_socket+0x75/0x80
[   95.890755]  do_syscall_64+0xc4/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] Freed by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  kasan_save_free_info+0x40/0x50
[   95.890755]  poison_slab_object+0x118/0x180
[   95.890755]  __kasan_slab_free+0x12/0x30
[   95.890755]  kfree+0xb2/0x240
[   95.890755]  __sk_destruct+0x317/0x410
[   95.890755]  sco_sock_release+0x232/0x280
[   95.890755]  sock_close+0xb2/0x210
[   95.890755]  __fput+0x37f/0x770
[   95.890755]  task_work_run+0x1ae/0x210
[   95.890755]  get_signal+0xe17/0xf70
[   95.890755]  arch_do_signal_or_restart+0x3f/0x520
[   95.890755]  syscall_exit_to_user_mode+0x55/0x120
[   95.890755]  do_syscall_64+0xd1/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] The buggy address belongs to the object at ffff88800c388000
[   95.890755]  which belongs to the cache kmalloc-1k of size 1024
[   95.890755] The buggy address is located 128 bytes inside of
[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)
[   95.890755]
[   95.890755] The buggy address belongs to the physical page:
[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388
[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   95.890755] ano
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225013">SUSE bug 1225013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27413</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/capsule-loader: fix incorrect allocation size

gcc-14 notices that the allocation with sizeof(void) on 32-bit architectures
is not enough for a 64-bit phys_addr_t:

drivers/firmware/efi/capsule-loader.c: In function 'efi_capsule_open':
drivers/firmware/efi/capsule-loader.c:295:24: error: allocation of insufficient size '4' for type 'phys_addr_t' {aka 'long long unsigned int'} with size '8' [-Werror=alloc-size]
  295 |         cap_info-&gt;phys = kzalloc(sizeof(void *), GFP_KERNEL);
      |                        ^

Use the correct type instead here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225315">SUSE bug 1225315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1170-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1172-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14523-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXHQWREVRCMINNOILT7P3YW7GOCJDXWZ/" source="SUSE-SU"/>
    <description>
    wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-11-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221831">SUSE bug 1221831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853981" comment="libblkid1-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853982" comment="libfdisk1-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154114" comment="libfdisk1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853983" comment="libmount1-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853984" comment="libsmartcols1-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853985" comment="libuuid1-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853986" comment="util-linux-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853987" comment="util-linux-systemd-2.37.2-150400.8.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28182</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1167-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1167-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019073.html" source="SUSE-SU"/>
    <description>
    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221399">SUSE bug 1221399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853565" comment="libnghttp2-14-1.40.0-150200.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28757</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036541.html" source="SUSE-SU"/>
    <description>
    libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221289">SUSE bug 1221289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853566" comment="libexpat1-2.4.4-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018994.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221746">SUSE bug 1221746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854661" comment="gnutls-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854662" comment="libgnutls30-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854663" comment="libgnutls30-hmac-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018994.html" source="SUSE-SU"/>
    <description>
    A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221747">SUSE bug 1221747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854661" comment="gnutls-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854662" comment="libgnutls30-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854663" comment="libgnutls30-hmac-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29038</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9424" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019074.html" source="SUSE-SU"/>
    <description>
    tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223687">SUSE bug 1223687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861081" comment="tpm2.0-tools-5.2-150400.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615872" comment="tpm2.0-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9424" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019074.html" source="SUSE-SU"/>
    <description>
    tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file.  As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223689">SUSE bug 1223689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861081" comment="tpm2.0-tools-5.2-150400.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615872" comment="tpm2.0-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29040</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29040" ref_url="https://www.suse.com/security/cve/CVE-2024-29040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1635-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019072.html" source="SUSE-SU"/>
    <description>
    This repository hosts source code implementing the Trusted Computing Group's (TCG) TPM2 Software Stack (TSS). The JSON Quote Info returned by Fapi_Quote has to be deserialized by Fapi_VerifyQuote to the TPM Structure `TPMS_ATTEST`. For the field `TPM2_GENERATED magic` of this structure any number can be used in the JSON structure. The verifier can receive a state which does not represent the actual, possibly malicious state of the device under test. The malicious device might get access to data it shouldn't, or can use services it shouldn't be able to. This 
issue has been patched in version 4.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29040/">CVE-2024-29040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223690">SUSE bug 1223690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861073" comment="libtss2-esys0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695701" comment="libtss2-esys0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861074" comment="libtss2-fapi1-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742552" comment="libtss2-fapi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861075" comment="libtss2-mu0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695702" comment="libtss2-mu0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861076" comment="libtss2-rc0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698084" comment="libtss2-rc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861077" comment="libtss2-sys1-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698085" comment="libtss2-sys1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861078" comment="libtss2-tcti-device0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742559" comment="libtss2-tcti-device0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861079" comment="libtss2-tctildr0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742566" comment="libtss2-tctildr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861080" comment="tpm2-0-tss-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742568" comment="tpm2-0-tss is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-06-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223019">SUSE bug 1223019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855836" comment="glibc-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855837" comment="glibc-devel-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855838" comment="glibc-locale-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855839" comment="glibc-locale-base-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31142</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31142" ref_url="https://www.suse.com/security/cve/CVE-2024-31142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
    <description>
    Because of a logical error in XSA-407 (Branch Type Confusion), the
mitigation is not applied properly when it is intended to be used.
XSA-434 (Speculative Return Stack Overflow) uses the same
infrastructure, so is equally impacted.

For more details, see:
  https://xenbits.xen.org/xsa/advisory-407.html
  https://xenbits.xen.org/xsa/advisory-434.html

    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31142/">CVE-2024-31142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31142">CVE-2024-31142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222302">SUSE bug 1222302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854660" comment="xen-libs-4.16.6_02-150400.4.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32487</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035617.html" source="SUSE-SU"/>
    <description>
    less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-11"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860372" comment="less-590-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177208" comment="less is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow.  This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223530">SUSE bug 1223530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: Null pointer crashes after notfound response

If the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference.  This flaw was introduced in glibc 2.15 when the
cache was added to nscd.

This vulnerability is only present in the nscd binary.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223589">SUSE bug 1223589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache may terminate daemon on memory allocation failure

The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients.  The
flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223426">SUSE bug 1223426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache assumes NSS callback uses in-buffer strings

The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34064</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035494.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `&gt;`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863244" comment="python3-Jinja2-2.10.1-150000.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253389" comment="python3-Jinja2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34397</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1830-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019344.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863159" comment="glib2-tools-2.70.5-150400.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863160" comment="libgio-2_0-0-2.70.5-150400.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863161" comment="libglib-2_0-0-2.70.5-150400.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863162" comment="libgmodule-2_0-0-2.70.5-150400.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863163" comment="libgobject-2_0-0-2.70.5-150400.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3446</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3446" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222843">SUSE bug 1222843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856046" comment="qemu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855895" comment="qemu-accel-tcg-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855896" comment="qemu-arm-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856047" comment="qemu-audio-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856048" comment="qemu-chardev-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856049" comment="qemu-guest-agent-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856050" comment="qemu-hw-display-qxl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856051" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856052" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856053" comment="qemu-hw-usb-redirect-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855913" comment="qemu-ipxe-1.0.0+-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855948" comment="qemu-s390x-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855917" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855918" comment="qemu-sgabios-8-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856054" comment="qemu-tools-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856055" comment="qemu-ui-opengl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856056" comment="qemu-ui-spice-core-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855925" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855926" comment="qemu-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3447</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3447" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3447" ref_url="https://www.suse.com/security/cve/CVE-2024-3447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019428.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s-&gt;data_count` and the size of  `s-&gt;fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3447/">CVE-2024-3447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3447">CVE-2024-3447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222845">SUSE bug 1222845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856046" comment="qemu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855895" comment="qemu-accel-tcg-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855896" comment="qemu-arm-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856047" comment="qemu-audio-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856048" comment="qemu-chardev-spice-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856049" comment="qemu-guest-agent-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856050" comment="qemu-hw-display-qxl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856051" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856052" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856053" comment="qemu-hw-usb-redirect-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855913" comment="qemu-ipxe-1.0.0+-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855948" comment="qemu-s390x-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855917" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855918" comment="qemu-sgabios-8-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856054" comment="qemu-tools-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856055" comment="qemu-ui-opengl-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856056" comment="qemu-ui-spice-core-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855925" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855926" comment="qemu-x86-6.2.0-150400.37.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0012" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1880-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1937-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018806.html" source="SUSE-SU"/>
    <description>
    Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863423" comment="python3-requests-2.25.1-150300.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152097" comment="python3-requests is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2003-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035961.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225365">SUSE bug 1225365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865705" comment="cups-config-2.2.7-150000.3.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865706" comment="libcups2-2.2.7-150000.3.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35811</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

This is the candidate patch of CVE-2023-47233 :
https://nvd.nist.gov/vuln/detail/CVE-2023-47233

In brcm80211 driver,it starts with the following invoking chain
to start init a timeout worker:

-&gt;brcmf_usb_probe
  -&gt;brcmf_usb_probe_cb
    -&gt;brcmf_attach
      -&gt;brcmf_bus_started
        -&gt;brcmf_cfg80211_attach
          -&gt;wl_init_priv
            -&gt;brcmf_init_escan
              -&gt;INIT_WORK(&amp;cfg-&gt;escan_timeout_work,
		  brcmf_cfg80211_escan_timeout_worker);

If we disconnect the USB by hotplug, it will call
brcmf_usb_disconnect to make cleanup. The invoking chain is :

brcmf_usb_disconnect
  -&gt;brcmf_usb_disconnect_cb
    -&gt;brcmf_detach
      -&gt;brcmf_cfg80211_detach
        -&gt;kfree(cfg);

While the timeout woker may still be running. This will cause
a use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.

Fix it by deleting the timer and canceling the worker in
brcmf_cfg80211_detach.

[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35815</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion

The first kiocb_set_cancel_fn() argument may point at a struct kiocb
that is not embedded inside struct aio_kiocb. With the current code,
depending on the compiler, the req-&gt;ki_ctx read happens either before
the IOCB_AIO_RW test or after that test. Move the req-&gt;ki_ctx read such
that it is guaranteed that the IOCB_AIO_RW test happens first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag

Otherwise after the GTT bo is released, the GTT and gart space is freed
but amdgpu_ttm_backend_unbind will not clear the gart page table entry
and leave valid mapping entry pointing to the stale system page. Then
if GPU access the gart address mistakely, it will read undefined value
instead page fault, harder to debug and reproduce the real issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225313">SUSE bug 1225313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in is_valid_oplock_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225011">SUSE bug 1225011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_show()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225012">SUSE bug 1225012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_write()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35895</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Prevent lock inversion deadlock in map delete elem

syzkaller started using corpuses where a BPF tracing program deletes
elements from a sockmap/sockhash map. Because BPF tracing programs can be
invoked from any interrupt context, locks taken during a map_delete_elem
operation must be hardirq-safe. Otherwise a deadlock due to lock inversion
is possible, as reported by lockdep:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;htab-&gt;buckets[i].lock);
                               local_irq_disable();
                               lock(&amp;host-&gt;lock);
                               lock(&amp;htab-&gt;buckets[i].lock);
  &lt;Interrupt&gt;
    lock(&amp;host-&gt;lock);

Locks in sockmap are hardirq-unsafe by design. We expects elements to be
deleted from sockmap/sockhash only in task (normal) context with interrupts
enabled, or in softirq context.

Detect when map_delete_elem operation is invoked from a context which is
_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an
error.

Note that map updates are not affected by this issue. BPF verifier does not
allow updating sockmap/sockhash from a BPF tracing program today.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: avoid dereference of garbage after mount failure

In case kern_mount() fails and returns an error pointer return in the
error branch instead of continuing and dereferencing the error pointer.

While on it drop the never read static variable selinuxfs_mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Protect against int overflow for stack access size

This patch re-introduces protection against the size of access to stack
memory being negative; the access size can appear negative as a result
of overflowing its signed int representation. This should not actually
happen, as there are other protections along the way, but we should
protect against it anyway. One code path was missing such protections
(fixed in the previous patch in the series), causing out-of-bounds array
accesses in check_stack_range_initialized(). This patch causes the
verification of a program with such a non-sensical access size to fail.

This check used to exist in a more indirect way, but was inadvertendly
removed in a833a17aeac7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226327">SUSE bug 1226327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix error cleanup path in nfsd_rename()

Commit a8b0026847b8 ("rename(): avoid a deadlock in the case of parents
having no common ancestor") added an error bail out path. However this
path does not drop the remount protection that has been acquired. Fix
the cleanup path to properly drop the remount protection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8365" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1939-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857793" comment="python3-idna-2.6-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857795" comment="python3-idna is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36926</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE

At the time of LPAR boot up, partition firmware provides Open Firmware
property ibm,dma-window for the PE. This property is provided on the PCI
bus the PE is attached to.

There are execptions where the partition firmware might not provide this
property for the PE at the time of LPAR boot up. One of the scenario is
where the firmware has frozen the PE due to some error condition. This
PE is frozen for 24 hours or unless the whole system is reinitialized.

Within this time frame, if the LPAR is booted, the frozen PE will be
presented to the LPAR but ibm,dma-window property could be missing.

Today, under these circumstances, the LPAR oopses with NULL pointer
dereference, when configuring the PCI bus the PE is attached to.

  BUG: Kernel NULL pointer dereference on read at 0x000000c8
  Faulting instruction address: 0xc0000000001024c0
  Oops: Kernel access of bad area, sig: 7 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in:
  Supported: Yes
  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-150600.9-default #1
  Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_023) hv:phyp pSeries
  NIP:  c0000000001024c0 LR: c0000000001024b0 CTR: c000000000102450
  REGS: c0000000037db5c0 TRAP: 0300   Not tainted  (6.4.0-150600.9-default)
  MSR:  8000000002009033 &lt;SF,VEC,EE,ME,IR,DR,RI,LE&gt;  CR: 28000822  XER: 00000000
  CFAR: c00000000010254c DAR: 00000000000000c8 DSISR: 00080000 IRQMASK: 0
  ...
  NIP [c0000000001024c0] pci_dma_bus_setup_pSeriesLP+0x70/0x2a0
  LR [c0000000001024b0] pci_dma_bus_setup_pSeriesLP+0x60/0x2a0
  Call Trace:
    pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 (unreliable)
    pcibios_setup_bus_self+0x1c0/0x370
    __of_scan_bus+0x2f8/0x330
    pcibios_scan_phb+0x280/0x3d0
    pcibios_init+0x88/0x12c
    do_one_initcall+0x60/0x320
    kernel_init_freeable+0x344/0x3e4
    kernel_init+0x34/0x1d0
    ret_from_kernel_user_thread+0x14/0x1c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BEJQC6TDQZLJ4YE746IHLCFJFUQ2JKQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224112">SUSE bug 1224112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868400" comment="podman-4.9.5-150400.4.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4032</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000077.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2959-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.

CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9056" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1882-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1882-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035499.html" source="SUSE-SU"/>
    <description>
    GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-23896.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224806">SUSE bug 1224806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864028" comment="gstreamer-plugins-base-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864029" comment="libgstallocators-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864030" comment="libgstapp-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864031" comment="libgstaudio-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864032" comment="libgstgl-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864033" comment="libgstpbutils-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864034" comment="libgstriff-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864035" comment="libgsttag-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864036" comment="libgstvideo-1_0-0-1.20.1-150400.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035614.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long DSA keys or parameters may be very
slow.

Impact summary: Applications that use the functions EVP_PKEY_param_check()
or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
experience long delays. Where the key or parameters that are being checked
have been obtained from an untrusted source this may lead to a Denial of
Service.

The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform
various checks on DSA parameters. Some of those computations take a long time
if the modulus (`p` parameter) is too large.

Trying to use a very large modulus is slow and OpenSSL will not allow using
public keys with a modulus which is over 10,000 bits in length for signature
verification. However the key and parameter check functions do not limit
the modulus size when performing the checks.

An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()
and supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

These functions are not called by OpenSSL itself on untrusted DSA keys so
only applications that directly call these functions may be vulnerable.

Also vulnerable are the OpenSSL pkey and pkeyparam command line applications
when using the `-check` option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-08"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224388">SUSE bug 1224388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864952" comment="libopenssl3-3.0.8-150400.4.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.4</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2036-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2051-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018839.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause
memory to be accessed that was previously freed in some situations

Impact summary: A use after free can have a range of potential consequences such
as the corruption of valid data, crashes or execution of arbitrary code.
However, only applications that directly call the SSL_free_buffers function are
affected by this issue. Applications that do not call this function are not
vulnerable. Our investigations indicate that this function is rarely used by
applications.

The SSL_free_buffers function is used to free the internal OpenSSL buffer used
when processing an incoming record from the network. The call is only expected
to succeed if the buffer is not currently in use. However, two scenarios have
been identified where the buffer is freed even when still in use.

The first scenario occurs where a record header has been received from the
network and processed by OpenSSL, but the full record body has not yet arrived.
In this case calling SSL_free_buffers will succeed even though a record has only
been partially processed and the buffer is still in use.

The second scenario occurs where a full record containing application data has
been received and processed by OpenSSL but the application has only read part of
this data. Again a call to SSL_free_buffers will succeed even though the buffer
is still in use.

While these scenarios could occur accidentally during normal operation a
malicious attacker could attempt to engineer a stituation where this occurs.
We are not aware of this issue being actively exploited.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225552">SUSE bug 1225552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799818" comment="openSUSE Leap Micro 5.4 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868396" comment="libopenssl-1_1-devel-1.1.1l-150400.7.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868397" comment="libopenssl1_1-1.1.1l-150400.7.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868398" comment="libopenssl1_1-hmac-1.1.1l-150400.7.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868316" comment="libopenssl3-3.0.8-150400.4.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868399" comment="openssl-1_1-1.1.1l-150400.7.69.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764905" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177173" version="1" comment="libpython3_6m1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764906" version="1" comment="python3 is &lt;3.6.15-150300.10.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151916" version="1" comment="python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764907" version="1" comment="python3-base is &lt;3.6.15-150300.10.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151647" version="1" comment="python3-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799818" version="1" comment="openSUSE-release is ==5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803949" version="1" comment="squashfs is &lt;4.6.1-150300.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151752" version="1" comment="squashfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754598" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754599" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.60.1.150400.24.24.3 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754840" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.23.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342860" version="1" comment="kernel-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861948" version="1" comment="perl is &lt;5.26.1-150300.17.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151455" version="1" comment="perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861949" version="1" comment="perl-base is &lt;5.26.1-150300.17.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151457" version="1" comment="perl-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757403" version="1" comment="qemu-ovmf-x86_64 is &lt;202202-150400.5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231460" version="1" comment="qemu-ovmf-x86_64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757406" version="1" comment="qemu-uefi-aarch64 is &lt;202202-150400.5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623392" version="1" comment="qemu-uefi-aarch64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803273" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152658" version="1" comment="libssh2-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851288" version="1" comment="kernel-default is &lt;5.14.21-150400.24.111.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851097" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.111.2.150400.24.52.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851903" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861736" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158152" version="1" comment="libcairo-gobject2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861737" version="1" comment="libcairo2 is &lt;1.16.0-150400.11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158156" version="1" comment="libcairo2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781385" version="1" comment="libicu73_2 is &lt;73.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782296" version="1" comment="libicu73_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781386" version="1" comment="libicu73_2-bedata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782297" version="1" comment="libicu73_2-bedata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781389" version="1" comment="libicu73_2-ledata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782300" version="1" comment="libicu73_2-ledata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816011" version="1" comment="docker is &lt;24.0.7_ce-150000.190.4 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744477" version="1" comment="qemu is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744319" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698020" version="1" comment="qemu-accel-tcg-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744320" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.14.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744478" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623393" version="1" comment="qemu-audio-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744479" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623395" version="1" comment="qemu-chardev-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744480" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744481" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623396" version="1" comment="qemu-hw-display-qxl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744482" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623397" version="1" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744483" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623399" version="1" comment="qemu-hw-display-virtio-vga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744484" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623401" version="1" comment="qemu-hw-usb-redirect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744194" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744332" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.14.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623404" version="1" comment="qemu-s390x is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744203" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744204" version="1" comment="qemu-sgabios is &lt;8-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151116" version="1" comment="qemu-sgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744485" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744486" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623406" version="1" comment="qemu-ui-opengl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744487" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623407" version="1" comment="qemu-ui-spice-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744213" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744337" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808033" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151317" version="1" comment="libtiff5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780690" version="1" comment="libssh2-1 is &lt;1.9.0-150000.4.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819464" version="1" comment="kernel-default is &lt;5.14.21-150400.24.103.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819417" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.103.1.150400.24.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819466" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869879" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869533" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.122.2.150400.24.58.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865707" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.82.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815105" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677871" version="1" comment="kernel-firmware-all is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815106" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677872" version="1" comment="kernel-firmware-amdgpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815107" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677873" version="1" comment="kernel-firmware-ath10k is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815108" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677874" version="1" comment="kernel-firmware-ath11k is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815109" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677875" version="1" comment="kernel-firmware-atheros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815110" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677876" version="1" comment="kernel-firmware-bluetooth is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815111" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677877" version="1" comment="kernel-firmware-bnx2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815112" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677878" version="1" comment="kernel-firmware-brcm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815113" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677879" version="1" comment="kernel-firmware-chelsio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815114" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677880" version="1" comment="kernel-firmware-dpaa2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815115" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677881" version="1" comment="kernel-firmware-i915 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815116" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677882" version="1" comment="kernel-firmware-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815117" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677883" version="1" comment="kernel-firmware-iwlwifi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815118" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677884" version="1" comment="kernel-firmware-liquidio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815119" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677885" version="1" comment="kernel-firmware-marvell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815120" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677886" version="1" comment="kernel-firmware-media is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815121" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677887" version="1" comment="kernel-firmware-mediatek is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815122" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677888" version="1" comment="kernel-firmware-mellanox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815123" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677889" version="1" comment="kernel-firmware-mwifiex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815124" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677890" version="1" comment="kernel-firmware-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815125" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677891" version="1" comment="kernel-firmware-nfp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815126" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677892" version="1" comment="kernel-firmware-nvidia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815127" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677893" version="1" comment="kernel-firmware-platform is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815128" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677894" version="1" comment="kernel-firmware-prestera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815129" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698055" version="1" comment="kernel-firmware-qcom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815130" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677895" version="1" comment="kernel-firmware-qlogic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815131" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677896" version="1" comment="kernel-firmware-radeon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815132" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677897" version="1" comment="kernel-firmware-realtek is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815133" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677898" version="1" comment="kernel-firmware-serial is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815134" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677899" version="1" comment="kernel-firmware-sound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815135" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677900" version="1" comment="kernel-firmware-ti is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815136" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677901" version="1" comment="kernel-firmware-ueagle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815137" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677902" version="1" comment="kernel-firmware-usb-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815138" version="1" comment="ucode-amd is &lt;20220509-150400.4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167634" version="1" comment="ucode-amd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847042" version="1" comment="kernel-default is &lt;5.14.21-150400.24.108.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846724" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.108.1.150400.24.50.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847037" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859567" version="1" comment="python3-rpm is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231456" version="1" comment="python3-rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859568" version="1" comment="rpm is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151943" version="1" comment="rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859569" version="1" comment="rpm-ndb is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631126" version="1" comment="rpm-ndb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800600" version="1" comment="qemu is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800547" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800548" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800601" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800602" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800603" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800604" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800605" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800606" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800607" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800518" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800560" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.23.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800526" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800527" version="1" comment="qemu-sgabios is &lt;8-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800608" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800609" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800610" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800535" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800565" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777400" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165954" version="1" comment="libbluetooth3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855250" version="1" comment="kernel-default is &lt;5.14.21-150400.24.116.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855166" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.116.1.150400.24.54.5 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855248" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861083" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860903" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.119.1.150400.24.56.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861084" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750864" version="1" comment="librados2 is &lt;16.2.11.58+g38d6afd3b78-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154240" version="1" comment="librados2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750865" version="1" comment="librbd1 is &lt;16.2.11.58+g38d6afd3b78-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154244" version="1" comment="librbd1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817821" version="1" comment="libjbig2 is &lt;2.1-150000.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151938" version="1" comment="libjbig2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815623" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813859" version="1" comment="containerd is &lt;1.7.8-150000.103.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153864" version="1" comment="containerd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813861" version="1" comment="runc is &lt;1.1.10-150000.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153867" version="1" comment="runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772450" version="1" comment="samba-client-libs is &lt;4.15.13+git.663.9c654e06cdb-150400.3.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666847" version="1" comment="samba-client-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772451" version="1" comment="samba-libs is &lt;4.15.13+git.663.9c654e06cdb-150400.3.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151306" version="1" comment="samba-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756419" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756420" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.63.1.150400.24.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756827" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855732" version="1" comment="shim is &lt;15.8-150300.4.20.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152144" version="1" comment="shim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758961" version="1" comment="ucode-intel is &lt;20230512-150200.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169251" version="1" comment="ucode-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743224" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151817" version="1" comment="libX11-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743063" version="1" comment="libX11-data is &lt;1.6.5-150000.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151819" version="1" comment="libX11-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743225" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151821" version="1" comment="libX11-xcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744035" version="1" comment="docker is &lt;20.10.23_ce-150000.175.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810448" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303048" version="1" comment="python3-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778394" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778395" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.81.1.150400.24.35.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778154" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778161" version="1" comment="ucode-intel is &lt;20230808-150200.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778685" version="1" comment="xen-libs is &lt;4.16.5_02-150400.4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151590" version="1" comment="xen-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774220" version="1" comment="libpcre2-8-0 is &lt;10.39-150400.4.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153653" version="1" comment="libpcre2-8-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747893" version="1" comment="xen-libs is &lt;4.16.3_06-150400.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766878" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766879" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.66.1.150400.24.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770398" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.37.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768420" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231072" version="1" comment="libopenssl-1_1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768421" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177120" version="1" comment="libopenssl1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768422" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231074" version="1" comment="libopenssl1_1-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768423" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177122" version="1" comment="openssl-1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781703" version="1" comment="supportutils is &lt;3.1.26-150300.7.35.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245545" version="1" comment="supportutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817822" version="1" comment="ppp is &lt;2.4.7-150000.5.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152115" version="1" comment="ppp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851284" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851285" version="1" comment="python3 is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851286" version="1" comment="python3-base is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868392" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151616" version="1" comment="gdk-pixbuf-query-loaders is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868393" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151618" version="1" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868394" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151620" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854018" version="1" comment="less is &lt;590-150400.3.6.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177208" version="1" comment="less is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960518" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743831" version="1" comment="vim-data-common is &lt;9.0.1386-150000.5.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177135" version="1" comment="vim-data-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744036" version="1" comment="vim-small is &lt;9.0.1386-150000.5.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670993" version="1" comment="vim-small is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743773" version="1" comment="glibc is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743774" version="1" comment="glibc-devel is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151370" version="1" comment="glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743775" version="1" comment="glibc-locale is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743776" version="1" comment="glibc-locale-base is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251612" version="1" comment="glibc-locale-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763482" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780429" version="1" comment="libxmlsec1-1 is &lt;1.2.37-150400.14.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239762" version="1" comment="libxmlsec1-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780433" version="1" comment="libxmlsec1-openssl1 is &lt;1.2.37-150400.14.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239766" version="1" comment="libxmlsec1-openssl1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755867" version="1" comment="libtpms0 is &lt;0.8.2-150300.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632653" version="1" comment="libtpms0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771273" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771274" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.69.1.150400.24.31.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755947" version="1" comment="vim-data-common is &lt;9.0.1443-150000.5.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756061" version="1" comment="vim-small is &lt;9.0.1443-150000.5.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755949" version="1" comment="xxd is &lt;9.0.1443-150000.5.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756472" version="1" comment="xxd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800972" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800973" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.92.1.150400.24.42.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800648" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819387" version="1" comment="libssh-config is &lt;0.9.8-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698027" version="1" comment="libssh-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819388" version="1" comment="libssh4 is &lt;0.9.8-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151772" version="1" comment="libssh4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771322" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802309" version="1" comment="suse-module-tools is &lt;15.4.18-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802364" version="1" comment="suse-module-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754600" version="1" comment="avahi is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151208" version="1" comment="avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754601" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151212" version="1" comment="libavahi-client3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754602" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151214" version="1" comment="libavahi-common3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754603" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151216" version="1" comment="libavahi-core7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779699" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151248" version="1" comment="libfreetype6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815362" version="1" comment="kernel-default is &lt;5.14.21-150400.24.100.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815363" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.100.2.150400.24.46.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815382" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798105" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798106" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.88.1.150400.24.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798885" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777869" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777870" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777871" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777872" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777873" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777874" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777875" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777876" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777877" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777878" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777879" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777880" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777881" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777882" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777883" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777884" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777885" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777886" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777887" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777888" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777889" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777890" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777891" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777892" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777893" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777894" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777895" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777896" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777897" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777898" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777899" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777900" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777901" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777902" version="1" comment="ucode-amd is &lt;20220509-150400.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810588" version="1" comment="xen-libs is &lt;4.16.5_08-150400.4.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776011" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776012" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.74.1.150400.24.33.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774833" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774834" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774835" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774836" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774837" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774838" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774839" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774840" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774841" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774842" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774843" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774844" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774845" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774846" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774847" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774848" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774849" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774850" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774851" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774852" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774853" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774854" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774855" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774856" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774857" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774858" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774859" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774860" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774861" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774862" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774863" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774864" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774865" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774866" version="1" comment="ucode-amd is &lt;20220509-150400.4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767211" version="1" comment="libvmtools0 is &lt;12.2.0-150300.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152857" version="1" comment="libvmtools0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767212" version="1" comment="open-vm-tools is &lt;12.2.0-150300.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152858" version="1" comment="open-vm-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797702" version="1" comment="python3-salt is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174860" version="1" comment="python3-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797703" version="1" comment="salt is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797704" version="1" comment="salt-minion is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797705" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479908" version="1" comment="salt-transactional-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797898" version="1" comment="libvmtools0 is &lt;12.3.0-150300.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797899" version="1" comment="open-vm-tools is &lt;12.3.0-150300.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813076" version="1" comment="libsqlite3-0 is &lt;3.44.0-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153745" version="1" comment="libsqlite3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813077" version="1" comment="sqlite3-tcl is &lt;3.44.0-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722601" version="1" comment="sqlite3-tcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808713" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808714" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.97.1.150400.24.44.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808417" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791545" version="1" comment="libeconf0 is &lt;0.5.2-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670995" version="1" comment="libeconf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853332" version="1" comment="ucode-intel is &lt;20240312-150200.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810835" version="1" comment="ucode-intel is &lt;20231114-150200.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764656" version="1" comment="vim-data-common is &lt;9.0.1572-150000.5.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764903" version="1" comment="vim-small is &lt;9.0.1572-150000.5.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747153" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.45.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747154" version="1" comment="python3 is &lt;3.6.15-150300.10.45.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747155" version="1" comment="python3-base is &lt;3.6.15-150300.10.45.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755558" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151144" version="1" comment="glib2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755559" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151145" version="1" comment="libgio-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755560" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151147" version="1" comment="libglib-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755561" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151149" version="1" comment="libgmodule-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755562" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151151" version="1" comment="libgobject-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770177" version="1" comment="libcap2 is &lt;2.63-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770414" version="1" comment="libcap2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771765" version="1" comment="python3-configobj is &lt;5.0.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779466" version="1" comment="python3-configobj is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754984" version="1" comment="kubevirt-manifests is &lt;0.54.0-150400.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624368" version="1" comment="kubevirt-manifests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754991" version="1" comment="kubevirt-virtctl is &lt;0.54.0-150400.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624375" version="1" comment="kubevirt-virtctl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763997" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763998" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763999" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764000" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764001" version="1" comment="libvirt-client is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151424" version="1" comment="libvirt-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764002" version="1" comment="libvirt-daemon is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151425" version="1" comment="libvirt-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764003" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151428" version="1" comment="libvirt-daemon-driver-interface is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764004" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151431" version="1" comment="libvirt-daemon-driver-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764005" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151432" version="1" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764006" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151433" version="1" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764007" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151434" version="1" comment="libvirt-daemon-driver-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764008" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151435" version="1" comment="libvirt-daemon-driver-secret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764009" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151436" version="1" comment="libvirt-daemon-driver-storage is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764010" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161274" version="1" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764011" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161275" version="1" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764012" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161276" version="1" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764013" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631621" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764014" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161277" version="1" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764015" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161278" version="1" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763777" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-150400.7.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161279" version="1" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764016" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161280" version="1" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764017" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151440" version="1" comment="libvirt-daemon-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764018" version="1" comment="libvirt-libs is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161281" version="1" comment="libvirt-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848499" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848500" version="1" comment="python3 is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848501" version="1" comment="python3-base is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767001" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742931" version="1" comment="libmicrohttpd12 is &lt;0.9.57-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751539" version="1" comment="libmicrohttpd12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760493" version="1" comment="curl is &lt;8.0.1-150400.5.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760494" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774216" version="1" comment="python3-salt is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774213" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776229" version="1" comment="python3-tornado is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774217" version="1" comment="salt is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774218" version="1" comment="salt-minion is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774219" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755320" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755321" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755322" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698019" version="1" comment="python3-libxml2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777401" version="1" comment="qemu is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777182" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777183" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.20.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777402" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777403" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777404" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777405" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777406" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777407" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777408" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777056" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777195" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.20.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777064" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777065" version="1" comment="qemu-sgabios is &lt;8-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777409" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777410" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777411" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777073" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777200" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782049" version="1" comment="mdadm is &lt;4.1-150300.24.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799720" version="1" comment="mdadm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853080" version="1" comment="xen-libs is &lt;4.16.5_14-150400.4.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781414" version="1" comment="docker is &lt;24.0.5_ce-150000.185.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851790" version="1" comment="login_defs is &lt;4.8.1-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670997" version="1" comment="login_defs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851791" version="1" comment="shadow is &lt;4.8.1-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166874" version="1" comment="shadow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756063" version="1" comment="libncurses6 is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158858" version="1" comment="libncurses6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756064" version="1" comment="ncurses-utils is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158863" version="1" comment="ncurses-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756065" version="1" comment="terminfo is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158865" version="1" comment="terminfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756066" version="1" comment="terminfo-base is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158866" version="1" comment="terminfo-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763996" version="1" comment="libldap-2_4-2 is &lt;2.4.46-150200.14.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152789" version="1" comment="libldap-2_4-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763721" version="1" comment="libldap-data is &lt;2.4.46-150200.14.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154130" version="1" comment="libldap-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764912" version="1" comment="opensc is &lt;0.22.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239073" version="1" comment="opensc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856046" version="1" comment="qemu is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855895" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855896" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.29.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856047" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856048" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856049" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856050" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856051" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856052" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856053" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855913" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855948" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.29.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855917" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855918" version="1" comment="qemu-sgabios is &lt;8-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856054" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856055" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856056" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855925" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855926" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754847" version="1" comment="dmidecode is &lt;3.4-150400.16.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755043" version="1" comment="dmidecode is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009762600" version="1" comment="libcares2 is &lt;1.19.1-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153706" version="1" comment="libcares2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768087" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767704" version="1" comment="libX11-data is &lt;1.6.5-150000.3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768088" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771462" version="1" comment="perl is &lt;5.26.1-150300.17.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771463" version="1" comment="perl-base is &lt;5.26.1-150300.17.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865820" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772448" version="1" comment="curl is &lt;8.0.1-150400.5.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772449" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764295" version="1" comment="cups-config is &lt;2.2.7-150000.3.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177129" version="1" comment="cups-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764296" version="1" comment="libcups2 is &lt;2.2.7-150000.3.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177130" version="1" comment="libcups2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797298" version="1" comment="cups-config is &lt;2.2.7-150000.3.51.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797299" version="1" comment="libcups2 is &lt;2.2.7-150000.3.51.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767761" version="1" comment="python3-requests is &lt;2.24.0-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152097" version="1" comment="python3-requests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848276" version="1" comment="libabsl2308_0_0 is &lt;20230802.1-150400.10.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848319" version="1" comment="libabsl2308_0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848281" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848324" version="1" comment="libprotobuf-lite25_1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771735" version="1" comment="libyajl2 is &lt;2.1.0-150000.4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710095" version="1" comment="libyajl2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809295" version="1" comment="python3-salt is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809291" version="1" comment="python3-simplejson is &lt;3.17.2-150300.3.4.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809307" version="1" comment="python3-simplejson is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809296" version="1" comment="salt is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809297" version="1" comment="salt-minion is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809298" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803782" version="1" comment="libvmtools0 is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803783" version="1" comment="open-vm-tools is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769278" version="1" comment="cups-config is &lt;2.2.7-150000.3.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769279" version="1" comment="libcups2 is &lt;2.2.7-150000.3.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801299" version="1" comment="xen-libs is &lt;4.16.5_06-150400.4.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772748" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772749" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772750" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772751" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769280" version="1" comment="dbus-1 is &lt;1.12.2-150400.18.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151535" version="1" comment="dbus-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769281" version="1" comment="dbus-1-x11 is &lt;1.12.2-150400.18.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151537" version="1" comment="dbus-1-x11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769282" version="1" comment="libdbus-1-3 is &lt;1.12.2-150400.18.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151538" version="1" comment="libdbus-1-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798971" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153583" version="1" comment="libnghttp2-14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777843" version="1" comment="krb5 is &lt;1.19.2-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151005" version="1" comment="krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776897" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776898" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776899" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776900" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776901" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153892" version="1" comment="libgstgl-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776902" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776903" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776904" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776905" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859893" version="1" comment="libsss_certmap0 is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231790" version="1" comment="libsss_certmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859894" version="1" comment="libsss_idmap0 is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859895" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859896" version="1" comment="sssd is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859897" version="1" comment="sssd-common is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632505" version="1" comment="sssd-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859898" version="1" comment="sssd-krb5-common is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859899" version="1" comment="sssd-ldap is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797300" version="1" comment="curl is &lt;8.0.1-150400.5.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797301" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777839" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777840" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777841" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803246" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700695" version="1" comment="libopenssl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777842" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851902" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773627" version="1" comment="openssh is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152110" version="1" comment="openssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773628" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659235" version="1" comment="openssh-clients is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773629" version="1" comment="openssh-common is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659236" version="1" comment="openssh-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773630" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153169" version="1" comment="openssh-fips is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773631" version="1" comment="openssh-server is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659237" version="1" comment="openssh-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852272" version="1" comment="avahi is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852273" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852274" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852275" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810251" version="1" comment="avahi is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810252" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810253" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810254" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814965" version="1" comment="avahi is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814966" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814967" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814968" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801459" version="1" comment="curl is &lt;8.0.1-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801460" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774221" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.52.10-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151634" version="1" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774222" version="1" comment="librsvg-2-2 is &lt;2.52.10-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151635" version="1" comment="librsvg-2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782053" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782054" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782055" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816615" version="1" comment="tar is &lt;1.34-150000.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151391" version="1" comment="tar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778866" version="1" comment="libprocps7 is &lt;3.3.15-150000.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009268885" version="1" comment="libprocps7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778867" version="1" comment="procps is &lt;3.3.15-150000.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009229657" version="1" comment="procps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794920" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794921" version="1" comment="python3 is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794922" version="1" comment="python3-base is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779189" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238038" version="1" comment="haproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809550" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152931" version="1" comment="libgcc_s1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809551" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152962" version="1" comment="libstdc++6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801458" version="1" comment="opensc is &lt;0.22.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801461" version="1" comment="samba-client-libs is &lt;4.15.13+git.691.3d3cea0641-150400.3.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801462" version="1" comment="samba-libs is &lt;4.15.13+git.691.3d3cea0641-150400.3.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777837" version="1" comment="gawk is &lt;4.2.1-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780094" version="1" comment="gawk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851287" version="1" comment="sudo is &lt;1.9.9-150400.4.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151407" version="1" comment="sudo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799872" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799824" version="1" comment="libX11-data is &lt;1.6.5-150000.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799873" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800538" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177231" version="1" comment="python3-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802970" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868463" version="1" comment="containerd is &lt;1.7.17-150000.111.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810408" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810409" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810410" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814269" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862123" version="1" comment="ucode-intel is &lt;20240514-150200.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803402" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802971" version="1" comment="libz1 is &lt;1.2.11-150000.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153971" version="1" comment="libz1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802972" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251909" version="1" comment="zlib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853557" version="1" comment="libncurses6 is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853558" version="1" comment="ncurses-utils is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853559" version="1" comment="terminfo is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853560" version="1" comment="terminfo-base is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815364" version="1" comment="curl is &lt;8.0.1-150400.5.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815365" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802976" version="1" comment="libzck1 is &lt;1.1.16-150400.3.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803766" version="1" comment="libzck1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812201" version="1" comment="vim-data-common is &lt;9.0.2103-150000.5.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812851" version="1" comment="vim-small is &lt;9.0.2103-150000.5.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813366" version="1" comment="traceroute is &lt;2.0.21-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814074" version="1" comment="traceroute is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791547" version="1" comment="login_defs is &lt;4.8.1-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791548" version="1" comment="shadow is &lt;4.8.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844743" version="1" comment="xen-libs is &lt;4.16.5_12-150400.4.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851780" version="1" comment="xen-libs is &lt;4.16.5_14-150400.4.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854660" version="1" comment="xen-libs is &lt;4.16.6_02-150400.4.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801457" version="1" comment="grub2 is &lt;2.06-150400.11.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801065" version="1" comment="grub2-arm64-efi is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623763" version="1" comment="grub2-arm64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801070" version="1" comment="grub2-i386-pc is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801077" version="1" comment="grub2-s390x-emu is &lt;2.06-150400.11.38.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623767" version="1" comment="grub2-s390x-emu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801080" version="1" comment="grub2-snapper-plugin is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801082" version="1" comment="grub2-x86_64-efi is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801085" version="1" comment="grub2-x86_64-xen is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796768" version="1" comment="vim-data-common is &lt;9.0.1894-150000.5.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797297" version="1" comment="vim-small is &lt;9.0.1894-150000.5.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850732" version="1" comment="vim-data-common is &lt;9.1.0111-150000.5.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851283" version="1" comment="vim-small is &lt;9.1.0111-150000.5.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800217" version="1" comment="glibc is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800218" version="1" comment="glibc-devel is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800219" version="1" comment="glibc-locale is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800220" version="1" comment="glibc-locale-base is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848194" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817184" version="1" comment="openssh is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817185" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817186" version="1" comment="openssh-common is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817187" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817188" version="1" comment="openssh-server is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813786" version="1" comment="python3-cryptography is &lt;3.3.2-150400.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238251" version="1" comment="python3-cryptography is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844431" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816335" version="1" comment="libncurses6 is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816336" version="1" comment="ncurses-utils is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816337" version="1" comment="terminfo is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816338" version="1" comment="terminfo-base is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848742" version="1" comment="openssh is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848743" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848744" version="1" comment="openssh-common is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848745" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848746" version="1" comment="openssh-server is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850745" version="1" comment="wpa_supplicant is &lt;2.9-150000.4.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152145" version="1" comment="wpa_supplicant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848747" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853566" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151332" version="1" comment="libexpat1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873840" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.65.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873841" version="1" comment="python3 is &lt;3.6.15-150300.10.65.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873842" version="1" comment="python3-base is &lt;3.6.15-150300.10.65.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848748" version="1" comment="libfreebl3 is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151498" version="1" comment="libfreebl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848749" version="1" comment="libsoftokn3 is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151499" version="1" comment="libsoftokn3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848750" version="1" comment="mozilla-nss is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151500" version="1" comment="mozilla-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848751" version="1" comment="mozilla-nss-certs is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151501" version="1" comment="mozilla-nss-certs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848752" version="1" comment="mozilla-nss-tools is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151503" version="1" comment="mozilla-nss-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810699" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810700" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810701" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813331" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810702" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814270" version="1" comment="gnutls is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814271" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177128" version="1" comment="libgnutls30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814272" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281488" version="1" comment="libgnutls30-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856057" version="1" comment="opensc is &lt;0.22.0-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846771" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845234" version="1" comment="cpio is &lt;2.13-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151389" version="1" comment="cpio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849010" version="1" comment="gnutls is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849011" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849012" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850762" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850763" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850764" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850765" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853562" version="1" comment="cni is &lt;0.7.1-150100.3.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280793" version="1" comment="cni is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853563" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.22.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280794" version="1" comment="cni-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852540" version="1" comment="podman is &lt;4.4.4-150400.4.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266791" version="1" comment="podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852433" version="1" comment="podman-cni-config is &lt;4.4.4-150400.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266792" version="1" comment="podman-cni-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853567" version="1" comment="curl is &lt;8.0.1-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853568" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868679" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151802" version="1" comment="libarchive13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847023" version="1" comment="runc is &lt;1.1.12-150000.61.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863244" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253389" version="1" comment="python3-Jinja2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847038" version="1" comment="python3-salt is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847039" version="1" comment="salt is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847040" version="1" comment="salt-minion is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847041" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819897" version="1" comment="pam is &lt;1.3.0-150000.6.66.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151504" version="1" comment="pam is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848741" version="1" comment="docker is &lt;24.0.7_ce-150000.193.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868400" version="1" comment="podman is &lt;4.9.5-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853062" version="1" comment="libvirt-client is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853063" version="1" comment="libvirt-daemon is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853064" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853065" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853066" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853067" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853068" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853069" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853070" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853071" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853072" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853073" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853074" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853075" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853076" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852838" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-150400.7.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853077" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853078" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853079" version="1" comment="libvirt-libs is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848936" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848937" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848938" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865158" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865159" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865160" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864952" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865161" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853561" version="1" comment="libcares2 is &lt;1.19.1-150000.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852271" version="1" comment="krb5 is &lt;1.19.2-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853981" version="1" comment="libblkid1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151787" version="1" comment="libblkid1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853982" version="1" comment="libfdisk1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154114" version="1" comment="libfdisk1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853983" version="1" comment="libmount1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151789" version="1" comment="libmount1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853984" version="1" comment="libsmartcols1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151791" version="1" comment="libsmartcols1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853985" version="1" comment="libuuid1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151793" version="1" comment="libuuid1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853986" version="1" comment="util-linux is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151795" version="1" comment="util-linux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853987" version="1" comment="util-linux-systemd is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151797" version="1" comment="util-linux-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853565" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854661" version="1" comment="gnutls is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854662" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854663" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861081" version="1" comment="tpm2.0-tools is &lt;5.2-150400.6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615872" version="1" comment="tpm2.0-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861073" version="1" comment="libtss2-esys0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695701" version="1" comment="libtss2-esys0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861074" version="1" comment="libtss2-fapi1 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742552" version="1" comment="libtss2-fapi1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861075" version="1" comment="libtss2-mu0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695702" version="1" comment="libtss2-mu0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861076" version="1" comment="libtss2-rc0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698084" version="1" comment="libtss2-rc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861077" version="1" comment="libtss2-sys1 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698085" version="1" comment="libtss2-sys1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861078" version="1" comment="libtss2-tcti-device0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742559" version="1" comment="libtss2-tcti-device0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861079" version="1" comment="libtss2-tctildr0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742566" version="1" comment="libtss2-tctildr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861080" version="1" comment="tpm2-0-tss is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742568" version="1" comment="tpm2-0-tss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855836" version="1" comment="glibc is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855837" version="1" comment="glibc-devel is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855838" version="1" comment="glibc-locale is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855839" version="1" comment="glibc-locale-base is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860372" version="1" comment="less is &lt;590-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864024" version="1" comment="glibc is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864025" version="1" comment="glibc-devel is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864026" version="1" comment="glibc-locale is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864027" version="1" comment="glibc-locale-base is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863159" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863160" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863161" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863162" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863163" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863423" version="1" comment="python3-requests is &lt;2.25.1-150300.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865705" version="1" comment="cups-config is &lt;2.2.7-150000.3.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865706" version="1" comment="libcups2 is &lt;2.2.7-150000.3.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857793" version="1" comment="python3-idna is &lt;2.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857795" version="1" comment="python3-idna is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864028" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864029" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864030" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864031" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864032" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864033" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864034" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864035" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864036" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868396" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868397" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868398" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868316" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868399" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-tcg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl2308_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite25_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzck1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1.150400.24.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202202-150400.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.111.2.150400.24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.190.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.103.1.150400.24.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2.150400.24.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.108.1.150400.24.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-150400.59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.116.1.150400.24.54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1.150400.24.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.11.58+g38d6afd3b78-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-150000.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-150000.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.663.9c654e06cdb-150400.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1.150400.24.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-150300.4.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230512-150200.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.23_ce-150000.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1.150400.24.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-150200.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_02-150400.4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.39-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.3_06-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1.150400.24.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.26-150300.7.35.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-150000.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-150000.5.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-150000.5.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.37-150400.14.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1.150400.24.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1.150400.24.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4.18-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.100.2.150400.24.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1.150400.24.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_08-150400.4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1.150400.24.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1.150400.24.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240312-150200.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231114-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1572-150000.5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1572-150000.5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.63-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-150400.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.57-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150300.24.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_14-150400.4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.5_ce-150000.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-150400.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230802.1-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-150300.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_06-150400.4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150400.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150400.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.10-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-150000.7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.691.3d3cea0641-150400.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.9-150400.4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-150000.111.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240514-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.16-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150000.5.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150000.5.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_12-150400.4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_14-150400.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.6_02-150400.4.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-150000.5.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-150000.5.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150000.5.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150000.5.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150400.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-150000.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.2-150400.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-150000.61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.193.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.2-150400.8.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-150400.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
</states>
</oval_definitions>
